Academic literature on the topic 'Internet (computer network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet (computer network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet (computer network)"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
APA, Harvard, Vancouver, ISO, and other styles
2

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each compu
APA, Harvard, Vancouver, ISO, and other styles
3

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Full text
Abstract:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer netwo
APA, Harvard, Vancouver, ISO, and other styles
4

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Full text
Abstract:
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
6

M.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Full text
Abstract:
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 m
APA, Harvard, Vancouver, ISO, and other styles
7

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Full text
Abstract:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the int
APA, Harvard, Vancouver, ISO, and other styles
8

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Full text
Abstract:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase u
APA, Harvard, Vancouver, ISO, and other styles
9

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Full text
Abstract:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
APA, Harvard, Vancouver, ISO, and other styles
10

Zulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.

Full text
Abstract:
A computer network system is defined as a collection of several independent computers connected to each other. This connection allows these computers to share information and programs with each other (Putuasduki, 2021). SOHO stands for Small Office, Home Office. SOHO is a hybrid apartment between residential and commercial space, where people can work and live in the same building. SOHO apartments are typically loft style, meaning they have high ceilings. High ceilings lend themselves well to building a mezzanine, an elevated area accessible by stairs that can be used as a bedroom or desk. (Ar
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet (computer network)"

1

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Full text
Abstract:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access P
APA, Harvard, Vancouver, ISO, and other styles
3

Pezaros, D. "Network traffic measurement for the next generation Internet." Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.

Full text
Abstract:
Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differenti
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Full text
Abstract:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater
APA, Harvard, Vancouver, ISO, and other styles
6

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Zaichen, and 張在琛. "Network-supported internet multicast congestion and error control." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
9

Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet (computer network)"

1

Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hare, Chris. Internet firewallsand network security. 2nd ed. Indianapolis, Ind: New Riders Publishing, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Danny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Indianapolis, Ind: Cisco, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Internet yong hu ci dian" bian yi zu., ed. Internet yung hu ci dian =: Internet user's dictionary. Guangzhou: Ji nan da xue chu ban she, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maloff, Joel. Mecklermedia's official Internet World net.profit: Expanding your business using the Internet. London: Internet World, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hare, Chris. Internet firewalls and network security. 2nd ed. Indianapolis, Ind: New Riders Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hansgeorg, Schmidt-Bergmann, Liesegang Torsten, and Museum für Literatur am Oberrhein., eds. Liter@tur: Computer-Literatur-Internet. Bielefeld: Aisthesis, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

William, Stallings. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

William, Stallings. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet (computer network)"

1

Howser, Gerry. "The Network Layer." In Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howser, Gerry. "The Laboratory Network." In Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei, Zhao, Yanli Lv, Chunhe Xia, Yang Luo, and Qing Wei. "A Computer Network Defense Policy Refinement Method." In Frontiers in Internet Technologies, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53959-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmad, Muhammad Aminu, and Steve Woodhead. "Containment of Fast Scanning Computer Network Worms." In Internet and Distributed Computing Systems, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23237-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Howser, Gerry. "Shortest Path Through the Network." In Computer Networks and the Internet, 205–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goertzel, Ben. "The Network is the Computer is the Mind (is the World)." In Creating Internet Intelligence, 97–113. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0561-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Huan, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, and Chunping Zhao. "Analysis on the Security of Satellite Internet." In Communications in Computer and Information Science, 193–205. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_14.

Full text
Abstract:
AbstractSatellite Internet (SI) is a new way to provide internet access all over the world. It will bring great convenience to international communication. Compared with the traditional communication networks, SI has a significant change in network architecture and communication model, which will have an important impact on national information network security. For example, the global interconnected SI consists of a large number of small satellites and each satellite has multi-beams to cover a vast area, which leads to the disorderly flow of information across the border, and greatly increases the difficulty of network protection. Therefore, it is necessary to closely track the development of SI and analyze security problems brought by SI. In this paper, we analyze the security risks of SI from the perspective of national security, network security and equipment security, and thirteen security issues have been summarized to provide reference for the healthy development of SI industry.
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Internet of Things (IoT): Growth, Challenges, and Security." In Guide to Computer Network Security, 517–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Warren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maillé, Patrick, Peter Reichl, and Bruno Tuffin. "Internet Governance and Economics of Network Neutrality." In Lecture Notes in Computer Science, 108–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30382-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet (computer network)"

1

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garsva, Eimantas, Nerijus Paulauskas, Gediminas Grazulevicius, and Lech Gulbinovic. "Academic computer network traffic statistical analysis." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Yun-xia, Yue-long Zhao, and Xi Yang. "The Computer Network with Intelligent Disks." In 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zehao, Lin Peng, He Wang, Jin Sun, Tao Chang, and Ling Zhuo. "A wearable computer wireless sensor network." In 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2017. http://dx.doi.org/10.1109/ei2.2017.8245389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kotenko, Igor, and Alexander Ulanov. "Antagonistic Agents in the Internet: Computer Network Warfare Simulation." In 2006 9th International Conference on Information Fusion. IEEE, 2006. http://dx.doi.org/10.1109/icif.2006.301705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xianglong, Liu, Lou Yihua, Liang Yuan, and Shan Baosong. "Predicting Internet Network Distance Using ISOMAP." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matray, Peter, Peter Haga, Sandor Laki, Istvan Csabai, and Gabor Vattay. "On the network geography of the Internet." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5934909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xiong, Sha. "The Application of “Internet+” Artificial Intelligence in Computer Network Technology." In 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI). IEEE, 2023. http://dx.doi.org/10.1109/icdacai59742.2023.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet (computer network)"

1

Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

VEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, November 2023. http://dx.doi.org/10.12731/er0743.18112023.

Full text
Abstract:
The computer game "The Way to a secure Internet" was created by teachers of the MDOU "D/ s № 73" of Magnitogorsk on the cross-platform environment for the development of Unity computer programs. The game is aimed at older preschool children. It is aimed at the formation of life skills of students in the information society in order to ensure the information security of children. The main educational material is the selection of rules for safe behavior when using the Internet information network by students, taking into account the peculiarities of children's perception of information. The plot
APA, Harvard, Vancouver, ISO, and other styles
3

Nechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Full text
Abstract:
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Merced
APA, Harvard, Vancouver, ISO, and other styles
4

Sokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0785.29012024.

Full text
Abstract:
The e-learning course "Informatics" is compiled in accordance with the requirements of the Federal State Educational Standard of Higher Education in the specialty 33.05.01 Pharmacy (specialty level), approved by Order of the Ministry of Education and Science of the Russian Federation dated August 11, 2016 No. 1037, and taking into account the requirements of the professional standard 02.006 "Pharmacist", approved by order of the Ministry of Labor and Social Protection No. 91n of the Russian Federation dated March 9, 2016. The purpose of the course is to master the necessary amount of theoretic
APA, Harvard, Vancouver, ISO, and other styles
5

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
6

Bragdon, Sophia, Vuong Truong, and Jay Clausen. Environmentally informed buried object recognition. Engineer Research and Development Center (U.S.), November 2022. http://dx.doi.org/10.21079/11681/45902.

Full text
Abstract:
The ability to detect and classify buried objects using thermal infrared imaging is affected by the environmental conditions at the time of imaging, which leads to an inconsistent probability of detection. For example, periods of dense overcast or recent precipitation events result in the suppression of the soil temperature difference between the buried object and soil, thus preventing detection. This work introduces an environmentally informed framework to reduce the false alarm rate in the classification of regions of interest (ROIs) in thermal IR images containing buried objects. Using a da
APA, Harvard, Vancouver, ISO, and other styles
7

Modlo, Yevhenii O., Serhiy O. Semerikov, Ruslan P. Shajda, Stanislav T. Tolmachev, and Oksana M. Markova. Methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3878.

Full text
Abstract:
The article describes the components of methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects: using various methods of representing models; solving professional problems using ICT; competence in electric machines and critical thinking. On the content of learning academic disciplines “Higher mathematics”, “Automatic control theory”, “Modeling of electromechanical systems”, “Electrical machines” features of use are disclosed for Scilab, SageCell, Google Sheets, Xcos on Cloud in
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41042.

Full text
Abstract:
Bio-structures owe their remarkable mechanical properties to their hierarchical geometrical arrangement as well as heterogeneous material properties. This dissertation presents an integrated, interdisciplinary approach that employs computational mechanics combined with flow network analysis to gain fundamental insights into the failure mechanisms of high performance, light-weight, structured composites by examining the stress flow patterns formed in the nascent stages of loading for the rostrum of the paddlefish. The data required for the flow network analysis was generated from the finite ele
APA, Harvard, Vancouver, ISO, and other styles
9

Varina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.

Full text
Abstract:
Technologies based on cloud computing is one of the demanded and actively developing areas of the modern information world. Cloud computing refers to an innovative technology that allows you to combine IT resources of various hardware platforms into a single whole and provide the user with access to them via a local network or the global Internet. Cloud services from various providers offer users access to their resources via the Internet via free or shareware cloud applications, the hardware and software requirements of which do not imply that the user has high-performance and resource-consum
APA, Harvard, Vancouver, ISO, and other styles
10

Goncharenko, Tatiana, Nataliia Yermakova-Cherchenko, and Yelyzaveta Anedchenko. Experience in the Use of Mobile Technologies as a Physics Learning Method. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4468.

Full text
Abstract:
Swift changes in society, related to sciences technicians’ development, technologies, by the increase of general volume of information, pull out new requirements for maintenance, structure, and quality of education. It requires teachers to diversify a tool in the direction of the increase in possibilities of the use of mobile technologies and computer systems. Lately in the world, more attention spared to the use of mobile learning, which in obedience to «Recommendations of UNESCO on the questions of a policy in the area of mobile learning» foresees the use of mobile technology, both separate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!