To see the other types of publications on this topic, follow the link: Computer systems and networks.

Journal articles on the topic 'Computer systems and networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer systems and networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
APA, Harvard, Vancouver, ISO, and other styles
2

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, e
APA, Harvard, Vancouver, ISO, and other styles
3

Waitzman, C. "Computer Networks: A Systems Approach." Computer Communications 24, no. 11 (2001): 1116–17. http://dx.doi.org/10.1016/s0140-3664(00)00345-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wittie, L. D. "Computer networks and distributed systems." Computer 24, no. 9 (1991): 67–76. http://dx.doi.org/10.1109/2.84901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sherif, Yosef S., and Brian J. Matt. "Computer networks and distributed systems." Microelectronics Reliability 28, no. 3 (1988): 419–67. http://dx.doi.org/10.1016/0026-2714(88)90398-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Parker, Bret H. "Computer networks: A systems approach." Journal of the American Society for Information Science 48, no. 9 (1997): 861–62. http://dx.doi.org/10.1002/(sici)1097-4571(199709)48:9<861::aid-asi11>3.0.co;2-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boyanov, Petar. "PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS." Journal Scientific and Applied Research 6, no. 1 (2014): 141–47. http://dx.doi.org/10.46687/jsar.v6i1.151.

Full text
Abstract:
In this paper a performance and connection analysis of determined computer systems and networks is made. Each communication process and state must be daily scanned and analyzed by system administrators, security-professionals and IT specialists. Ensuring a secure flow of computer and network processes and performance is very important priority for many large and small companies and for normal users. Most of the malicious user and programmers use vulnerability in the selected network via determined computer and network processes.
APA, Harvard, Vancouver, ISO, and other styles
8

Chu, Dominique, Mikhail Prokopenko, and J. Christian J. Ray. "Computation by natural systems." Interface Focus 8, no. 6 (2018): 20180058. http://dx.doi.org/10.1098/rsfs.2018.0058.

Full text
Abstract:
Computation is a useful concept far beyond the disciplinary boundaries of computer science. Perhaps the most important class of natural computers can be found in biological systems that perform computation on multiple levels. From molecular and cellular information processing networks to ecologies, economies and brains, life computes. Despite ubiquitous agreement on this fact going back as far as von Neumann automata and McCulloch–Pitts neural nets, we so far lack principles to understand rigorously how computation is done in living, or active, matter. What is the ultimate nature of natural co
APA, Harvard, Vancouver, ISO, and other styles
9

Anno, Junpei, Leonard Barolli, Arjan Durresi, Fatos Xhafa, and Akio Koyama. "Performance Evaluation of Two Fuzzy-Based Cluster Head Selection Systems for Wireless Sensor Networks." Mobile Information Systems 4, no. 4 (2008): 297–312. http://dx.doi.org/10.1155/2008/876212.

Full text
Abstract:
Sensor networks supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities are emerging as a critically important computer class that enable novel and low cost applications. There are many fundamental problems that sensor networks research will have to address in order to ensure a reasonable degree of cost and system quality. Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the network's communication energy dissipation. However, selecting
APA, Harvard, Vancouver, ISO, and other styles
10

Trobec, Roman, Radivoje Vasiljević, Milo Tomašević, Veljko Milutinović, Ramon Beivide, and Mateo Valero. "Interconnection Networks in Petascale Computer Systems." ACM Computing Surveys 49, no. 3 (2016): 1–24. http://dx.doi.org/10.1145/2983387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Spragins, J. "Computer Networks: A systems approach [Books]." IEEE Network 10, no. 4 (1996): 4. http://dx.doi.org/10.1109/mnet.1996.527013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Von Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Obaidat, Mohammad S. "Modeling and Simulation of Computer Systems and Networks: Part II: Computer Systems." SIMULATION 68, no. 4 (1997): 205–7. http://dx.doi.org/10.1177/003754979706800401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Burgin, Mark. "Triadic Automata and Machines as Information Transformers." Information 11, no. 2 (2020): 102. http://dx.doi.org/10.3390/info11020102.

Full text
Abstract:
Algorithms and abstract automata (abstract machines) are used to describe, model, explore and improve computers, cell phones, computer networks, such as the Internet, and processes in them. Traditional models of information processing systems—abstract automata—are aimed at performing transformations of data. These transformations are performed by their hardware (abstract devices) and controlled by their software (programs)—both of which stay unchanged during the whole computational process. However, in physical computers, their software is also changing by special tools such as interpreters, c
APA, Harvard, Vancouver, ISO, and other styles
15

Africa, Aaron Don M. "Application of Computer Systems in VPN Networks." International Journal of Emerging Trends in Engineering Research 8, no. 4 (2020): 1199–207. http://dx.doi.org/10.30534/ijeter/2020/41842020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Prabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liashchynskyi, Pavlo B., and O. M. Berezsky. "COMPUTER DIAGNOSTIC SYSTEMS: METHODS AND TOOLS." Ukrainian Journal of Information Technology 6, no. 2 (2024): 57–63. https://doi.org/10.23939/ujit2024.02.057.

Full text
Abstract:
The paper investigates computer diagnostic systems, their architectures, methods, and algorithms used in their work to diagnose cancer, including breast, lung, brain, and other tumors. Traditional and neural network methods for image segmentation and classification are analyzed and compared, and diagnostic tools in medicine are analyzed. The key approaches to medical image processing are investigated, in particular, the analysis of segmentation methods based on U-Net networks and classification using convolutional neural networks. It is established that neural network methods outperform tradit
APA, Harvard, Vancouver, ISO, and other styles
18

Jaber, Tanya Abdulsattar. "Artificial intelligence in computer networks." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 1 (2022): 309–22. https://doi.org/10.21533/pen.v10.i1.539.

Full text
Abstract:
Artificial Intelligence (AI) has been defined as a modern and intense scientific topic that enables computer-based systems or embedded systems to divide and solve problems by simulating complex biological procedures that are represented by specific algorithms along with (learning, reasoning, as well as self-correction). The present study provides a detailed assessment and review of applications of various artificial intelligence approaches for the purpose of improving the general efficiency of optical communication structures and networks and network systems in general. Using the AI-based appr
APA, Harvard, Vancouver, ISO, and other styles
19

Hopkins, Michael, Garibaldi Pineda-García, Petruţ A. Bogdan, and Steve B. Furber. "Spiking neural networks for computer vision." Interface Focus 8, no. 4 (2018): 20180007. http://dx.doi.org/10.1098/rsfs.2018.0007.

Full text
Abstract:
State-of-the-art computer vision systems use frame-based cameras that sample the visual scene as a series of high-resolution images. These are then processed using convolutional neural networks using neurons with continuous outputs. Biological vision systems use a quite different approach, where the eyes (cameras) sample the visual scene continuously, often with a non-uniform resolution, and generate neural spike events in response to changes in the scene. The resulting spatio-temporal patterns of events are then processed through networks of spiking neurons. Such event-based processing offers
APA, Harvard, Vancouver, ISO, and other styles
20

Mikhav, Volodymyr, Yelyzaveta Meleshko, and Mykola Yakymenko. "Development of a Database Management System of Recommendation Systems for Computer Networks and Computer-integrated Systems." Central Ukrainian Scientific Bulletin. Technical Sciences 2, no. 5(36) (2022): 130–36. http://dx.doi.org/10.32515/2664-262x.2022.5(36).2.130-136.

Full text
Abstract:
The goal of this work is to develop a database management system of the recommendation system for computer networks and computer-integrated systems, as well as to compare the quality of its work with existing systems. Today, recommendation systems are widely used in computer networks, in particular, in social networks, Internet commerce systems, media content distribution, advertising, etc., as well as in computer-integrated systems, in particular, in the Internet of Things and smart houses. An effective way to present the data required for the recommendation system can reduce the number of re
APA, Harvard, Vancouver, ISO, and other styles
21

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
APA, Harvard, Vancouver, ISO, and other styles
22

Farr, Tom. "Trusted networks." ITNOW 30, no. 2 (1988): 25–29. https://doi.org/10.1093/combul/30.2.25.

Full text
Abstract:
Abstract Computer systems are today used for an increasing number of applications in which safety or security is crucial. Examples include process control, especially in the chemical or nuclear industry, electronic funds transfer, fly-by-wire and military systems. Traditional approaches to safeguarding the data or processing capability of the system rely on physical isolation of the system and strict access control of users to the terminals. Such approaches are now less practicable in view of the widespread use of distributed processing systems, and the increasing trend for semi-automatic, ie
APA, Harvard, Vancouver, ISO, and other styles
23

Multaheb, Samim Ahmad, Bernd Zimmering, and Oliver Niggemann. "Expressing uncertainty in neural networks for production systems." at - Automatisierungstechnik 69, no. 3 (2021): 221–30. http://dx.doi.org/10.1515/auto-2020-0122.

Full text
Abstract:
Abstract The application of machine learning, especially of trained neural networks, requires a high level of trust in their results. A key to this trust is the network’s ability to assess the uncertainty of the computed results. This is a prerequisite for the use of such networks in closed-control loops and in automation systems. This paper describes approaches for enabling neural networks to automatically learn the uncertainties of their results.
APA, Harvard, Vancouver, ISO, and other styles
24

Pashynskykh, Vladyslav, Yelyzaveta Meleshko, Mykola Yakymenko, Dmytro Bashchenko, and Roman Tkachuk. "RESEARCH OF THE POSSIBILITIES OF THE C# PROGRAMMING LANGUAGE FOR CREATING CYBERSECURITY ANALYSIS SOFTWARE IN COMPUTER NETWORKS AND COMPUTER-INTEGRATED SYSTEMS." Advanced Information Systems 6, no. 2 (2022): 48–56. http://dx.doi.org/10.20998/2522-9052.2022.2.09.

Full text
Abstract:
The object of research in the article are the tools and capabilities of the C# programming language for the implementation of cybersecurity analysis software in local computer networks and computer-integrated systems. The relevance of the study is due to the importance of information security of computer and computer-integrated systems in government, military-industrial complex, private business etc., and due to the importance of training cybersecurity professionals in higher education to consider teaching examples in popular programming languages. The goal of the work is to research the possi
APA, Harvard, Vancouver, ISO, and other styles
25

Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.

Full text
Abstract:
Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The pap
APA, Harvard, Vancouver, ISO, and other styles
26

Mijwel, Maad M., Adam Esen, and Aysar Shamil. "Overview of Neural Networks." Babylonian Journal of Machine Learning 2023 (August 11, 2023): 42–45. http://dx.doi.org/10.58496/bjml/2023/008.

Full text
Abstract:
Since it was confirmed and verified that the human nervous system consists of individual cells, which were later called neurons, and it was discovered that these cells connect with each other to form an extensive communication network, a large number of possibilities have been opened for application in multiple disciplines in areas of knowledge. Neural Networks are created to perform tasks such as pattern recognition, classification, regression, and many other functions that serve humans and are an essential component in the field of machine learning and artificial intelligence. In computer sc
APA, Harvard, Vancouver, ISO, and other styles
27

Flerov, E. V., I. N. Sablin, O. G. Broitman, V. A. Tolmachev, and Sh S. Batchaev. "Computer-Assisted Monitoring Systems. Use of Computer Networks and Internet Technologies." Biomedical Engineering 39, no. 4 (2005): 161–66. http://dx.doi.org/10.1007/s10527-005-0072-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Filho, Edmundo Alves, Francisco Welington Lima, Tayroni Francisco Alencar Alves, Gladstone de Alencar Alves, and Joao Antonio Plascak. "Opinion Dynamics Systems via Biswas–Chatterjee–Sen Model on Solomon Networks." Physics 5, no. 3 (2023): 873–82. http://dx.doi.org/10.3390/physics5030056.

Full text
Abstract:
The critical properties of a discrete version of opinion dynamics systems, based on the Biswas–Chatterjee–Sen model defined on Solomon networks with both nearest and random neighbors, are investigated through extensive computer simulations. By employing Monte Carlo algorithms on SNs of different sizes, the magnetic-like variables of the model are computed as a function of the noise parameter. Using the finite-size scaling hypothesis, it is observed that the model undergoes a second-order phase transition. The critical transition noise and the respective ratios of the usual critical exponents a
APA, Harvard, Vancouver, ISO, and other styles
29

Abdullayeva, O., and M. Engalichev. "Artificial intelligence systems." Значение цифровых технологий в изучении истории Узбекистана 1, no. 01 (2022): 382–85. http://dx.doi.org/10.47689/.v1i01.13612.

Full text
Abstract:
Today, artificial intelligence is becoming more and more popular in almost every aspect of our daily lives. Artificial intelligence is usually concerned withthe creation of computer systems with the capabilities of the human mind: understanding, learning, discussing, solving problems, translating, and so on. During the study of artificial intelligence, human-intelligent programming, technologies and tools for designing intelligent systems, databases, knowledge bases, database management systems, speech interfaces, computer linguistics, computer graphics, computer networks and web programming ,
APA, Harvard, Vancouver, ISO, and other styles
30

Zolkin, A. L., A. N. Losev, D. V. Gridina, and T. G. Aygumov. "Research of problems of computer networks expert systems." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (2021): 012106. http://dx.doi.org/10.1088/1757-899x/1047/1/012106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Gerfelder, Norbert. "Video Application in Multimedia Systems and Computer Networks." SMPTE Journal 105, no. 11 (1996): 689–97. http://dx.doi.org/10.5594/j06441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Camarero, Cristobal, Carmen Martinez, Enrique Vallejo, and Ramon Beivide. "Projective Networks: Topologies for Large Parallel Computer Systems." IEEE Transactions on Parallel and Distributed Systems 28, no. 7 (2017): 2003–16. http://dx.doi.org/10.1109/tpds.2016.2635640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Douligeris, C. "Computer networks design using hybrid fuzzy expert systems." Soft Computing 5, no. 4 (2001): 272–86. http://dx.doi.org/10.1007/s005000100101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Anisimov, V. G., E. G. Anisimov, T. N. Saurenko, and V. P. Los’. "Performance Evaluation of Antivirus Systems for Computer Networks." Automatic Control and Computer Sciences 56, no. 8 (2022): 883–87. http://dx.doi.org/10.3103/s0146411622080016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Xiao Guang. "Research on the Development and Applications of Artificial Neural Networks." Applied Mechanics and Materials 556-562 (May 2014): 6011–14. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6011.

Full text
Abstract:
Intelligent control is a class of control techniques that use various AI computing approaches like neural networks, Bayesian probability, fuzzy logic, machine learning, evolutionary computation and genetic algorithms. In computer science and related fields, artificial neural networks are computational models inspired by animals’ central nervous systems (in particular the brain) that are capable of machine learning and pattern recognition. They are usually presented as systems of interconnected “neurons” that can compute values from inputs by feeding information through the network. Like other
APA, Harvard, Vancouver, ISO, and other styles
36

Gumelar, Gugum, and Weni Gurita Aedi. "Security Challenges in Computer Networks and Modern Operating Systems." Dinasti International Journal of Education Management And Social Science 6, no. 5 (2025): 3541–47. https://doi.org/10.38035/dijemss.v6i5.4516.

Full text
Abstract:
This study aims to identify and analyze the various security challenges faced in modern computer networks and operating systems. The research method used is descriptive qualitative, with data obtained from various sources, including journal articles related to computer networks and operating systems. Journal articles on network management, protocols, security, and performance, as well as research reports and case studies that address security challenges in modern computer networks and operating systems. The results show that the main challenge in maintaining the security of networks and operat
APA, Harvard, Vancouver, ISO, and other styles
37

Farsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (1988): 482. http://dx.doi.org/10.1177/109634808801200259.

Full text
Abstract:
Local area networks (LANs) are probably the most flexible and adaptable to customizing communications systems. LANs can virtually fit any location/site requirements. They can be tailored for any number of users, any application type and any cost/performance ratio. LANs can work with small (micro computers), medium (mini computers) and large/complex (mainframe) systems. This great flexibility which is due to several factors like, distributed architecture design, software standards, and hardware independence technology make LANs easy to use in a computer laboratory environment. Currently, many h
APA, Harvard, Vancouver, ISO, and other styles
38

G, Aruna Kranthi. "Prevention of production network system from Attackers using Honeypot based Systems." International Journal of Research and Applications 6, no. 22 (2019): 1201–4. https://doi.org/10.5281/zenodo.13347466.

Full text
Abstract:
<strong>A</strong><strong>BSTRACT</strong>Computer Networks and Internet has become extremely well known now a days since it fulfills&nbsp;individuals with fluctuating needs by giving assortment of fitting services. Computer Networks have&nbsp;reformed our utilization of computers. Online bills, shopping, transactions and numerous other&nbsp;fundamental activities performed in a hurry by only a solitary snap from our homes. In spite of the&nbsp;fact that it is a shelter in this period, it likewise has its own dangers and shortcomings as well.&nbsp;Ventures need to tussle to give security to th
APA, Harvard, Vancouver, ISO, and other styles
39

Fan, Chengmei, M. Mobeen Munir, Zafar Hussain, Muhammad Athar, and Jia-Bao Liu. "Polynomials and General Degree-Based Topological Indices of Generalized Sierpinski Networks." Complexity 2021 (February 9, 2021): 1–10. http://dx.doi.org/10.1155/2021/6657298.

Full text
Abstract:
Sierpinski networks are networks of fractal nature having several applications in computer science, music, chemistry, and mathematics. These networks are commonly used in chaos, fractals, recursive sequences, and complex systems. In this article, we compute various connectivity polynomials such as M -polynomial, Zagreb polynomials, and forgotten polynomial of generalized Sierpinski networks S k n and recover some well-known degree-based topological indices from these. We also compute the most general Zagreb index known as α , β -Zagreb index and several other general indices of similar nature
APA, Harvard, Vancouver, ISO, and other styles
40

Dr., Khaldoun Bsoul. "COMPUTER NETWORKS AS AN ELEMENT OF LOGISTICS INFORMATION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 8, no. 3 (2019): 161–64. https://doi.org/10.5281/zenodo.2607938.

Full text
Abstract:
Objectives: Determine the place of network in a logistics enterprise system. Offer the parameters system of an estimation of computer network operation efficiency. Methods/Statistical analysis:In order to build logistical information systems that can be used to solve practical and economic issues, the following stages are needed: 1. Data and information required for the use of logistics information systems. 2. The mathematical model design enables the use of logistics information systems. 3. Building a system for simulation and presentation to conduct the necessary applications and achieve the
APA, Harvard, Vancouver, ISO, and other styles
41

Bottoni, Paolo, Anna Labella, and Grzegorz Rozenberg. "Networks of Reaction Systems." International Journal of Foundations of Computer Science 31, no. 01 (2020): 53–71. http://dx.doi.org/10.1142/s0129054120400043.

Full text
Abstract:
In this paper, we study the behavior (processes) of reaction systems where the context is not arbitrary, but it has its own structure. In particular, we consider a model where the context for a reaction system originates from a network of reaction systems. Such a network is formalized as a graph with reaction systems residing at its nodes, where each reaction system contributes to defining the context of all its neighbors. This paper provides a framework for investigating the behavior of reaction systems receiving contexts from networks of reaction systems, provides a characterisation of their
APA, Harvard, Vancouver, ISO, and other styles
42

Jarah, Baker Akram Falah, Mufleh Amin AL Jarrah, Salam Nawaf Almomani, Emran AlJarrah, and Maen Al-Rashdan. "The effect of reliable data transfer and efficient computer network features in Jordanian banks accounting information systems performance based on hardware and software, database and number of hosts." International Journal of Data and Network Science 7, no. 1 (2023): 357–62. http://dx.doi.org/10.5267/j.ijdns.2022.9.012.

Full text
Abstract:
Reliable data transfer protocols are algorithmic techniques that guarantee the safe and secure transport of data through networks that could experience data loss or corruption. The performance of the systems and some accounting information systems (AIS) will be negatively impacted if the real-time data is not sent. The main factors that affect the performance of computer networks are the number of users, the hardware and software and the bandwidth. The computer network performance will play a role in the performance of the banks as it is an important component of the bank infrastructure. With
APA, Harvard, Vancouver, ISO, and other styles
43

Isabelle Pope. "Social Network Dynamic Modeling via Mathematical Applicative Formulae." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 05–08. http://dx.doi.org/10.17762/msea.v70i1.7.

Full text
Abstract:
For one or more files contained in databases, the computer forms a leading site for storage. In the majority of large firms, the databases tend to be in central systems, rather than on the individual employee computers. It is also worth noting that computer servers are contained in these respective firm central systems, offering services over networks. The implication is that the server hosts database files but, using different firm computers, an operator can access the files. An increase in database complexity translates into the formation of a social network. Therefore, a social network beco
APA, Harvard, Vancouver, ISO, and other styles
44

Chance, Jim. "Simulating computer systems." Microprocessors and Microsystems 12, no. 4 (1988): 238. http://dx.doi.org/10.1016/0141-9331(88)90176-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jesshope, Chris. "Distributed computer systems." Microprocessors and Microsystems 14, no. 7 (1990): 483–84. http://dx.doi.org/10.1016/0141-9331(90)90029-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Dymova, H. "Study of Cryptographic Security of Computer Networks." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 57 (February 13, 2025): 15–19. https://doi.org/10.36910/6775-2524-0560-2024-57-02.

Full text
Abstract:
The article examines modern aspects of cryptographic protection of computer networks, which are critically important in the context of growing information threats and cyberattacks, in particular in the context of military operations in Ukraine. The key tasks related to ensuring the confidentiality, integrity, and availability of information, as well as the challenges facing cryptographic systems in the context of the rapid development of computing power and attack methods, are considered. The article contains an analysis of the historical development of cryptography, starting from its fundamen
APA, Harvard, Vancouver, ISO, and other styles
47

Iglesias Perez, Sergio, and Regino Criado. "Increasing the Effectiveness of Network Intrusion Detection Systems (NIDSs) by Using Multiplex Networks and Visibility Graphs." Mathematics 11, no. 1 (2022): 107. http://dx.doi.org/10.3390/math11010107.

Full text
Abstract:
In this paper, we present a new approach to NIDS deployment based on machine learning. This new approach is based on detecting attackers by analyzing the relationship between computers over time. The basic idea that we rely on is that the behaviors of attackers’ computers are different from those of other computers, because the timings and durations of their connections are different and therefore easy to detect. This approach does not analyze each network packet statistically. It analyzes, over a period of time, all traffic to obtain temporal behaviors and to determine if the IP is an attacke
APA, Harvard, Vancouver, ISO, and other styles
48

ALTMAN, EITAN, HISAO KAMEDA, and YOSHIHISA HOSOKAWA. "NASH EQUILIBRIA IN LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS." International Game Theory Review 04, no. 02 (2002): 91–100. http://dx.doi.org/10.1142/s0219198902000574.

Full text
Abstract:
The use of game theoretical techniques has been quite successful in describing routing in networks, both in road traffic applications as well as in telecommunication networks applications. We study in this paper a third area of applications of such games, which is load balancing in distributed computer systems. One of the most important questions that arise in all applications of routing games is the existence and uniqueness of equilibrium. Whereas the existence of Nash equilibrium is known for general models of networks under weak assumptions, uniqueness results are only known for very specia
APA, Harvard, Vancouver, ISO, and other styles
49

М.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.

Full text
Abstract:
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the m
APA, Harvard, Vancouver, ISO, and other styles
50

Teplytskyi, B. "Current Issues an Examination Computer Hardware and Software Products during the Investigation of Crimes in the Use of Computers (Computer) Systems, Computer Networks and Telecommunication Networks." Naukovij vìsnik Nacìonalʹnoï akademìï vnutrìšnìh sprav 120, no. 3 (2021): 28–34. http://dx.doi.org/10.33270/01211203.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!