Academic literature on the topic 'Internet (Computer network) in art'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet (Computer network) in art.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet (Computer network) in art"

1

Pilcher, Jeremy. "Network Art Unbound?" Leonardo 45, no. 5 (October 2012): 470–71. http://dx.doi.org/10.1162/leon_a_00447.

Full text
Abstract:
Internet art that visualizes data has art historical precedents that invite its critical effect to be engaged with as rhetoric and not only an accurate representation of a specific state of affairs. Art that opens an engagement with a representation of data as an iteration of an underlying system invites an awareness of the contingency of that system. The nature of the internet makes it an effective site for this to occur. Internet art may allow an awareness of how a system might become more ethical in the future.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Bo, and Jian Yun. "State of Art Techniques in En-Route Caching." Advanced Materials Research 121-122 (June 2010): 1018–22. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.1018.

Full text
Abstract:
The World Wide Web has been considered as a large distributed information system based development and use of computer technology that both provide access to shared data objects. En-Cache techniques are important for reducing Internet access latency, network traffic, and server load in different networks. In this paper, we survey the state-of-art techniques used in En-route Caching and discuss the recent development.
APA, Harvard, Vancouver, ISO, and other styles
3

EICHMANN, DAVID. "ADVANCES IN NETWORK INFORMATION DISCOVERY AND RETRIEVAL." International Journal of Software Engineering and Knowledge Engineering 05, no. 01 (March 1995): 143–60. http://dx.doi.org/10.1142/s0218194095000083.

Full text
Abstract:
Access to information using the Internet has undergone dramatic change and expansion recently. The unrivaled success of the World Wide Web has altered the Internet from something approachable only by the initiated to something of a media craze — the information superhighway made manifest in the personal "home page". This paper surveys the beginnings of network information discovery and retrieval, how the Web has created a surprising level of integration of these systems, and where the current state of the art lies in creating globally accessible information spaces and supporting access to those information spaces.
APA, Harvard, Vancouver, ISO, and other styles
4

Broeckmann, Andreas. "Reseau/Resonance: Connective Processes and Artistic Practice." Leonardo 37, no. 4 (August 2004): 280–86. http://dx.doi.org/10.1162/0024094041724544.

Full text
Abstract:
Most Internet art projects use the Net solely as a telematic and telecommunicative transmission medium that connects computers and servers and through which artists, performers and users exchange data, communicate and collaboratively create files and events. At the same time, however, some artists are exploring the electronic networks as specific socio-technical structures with their respective forms of social and machinic agency, in which people and machines interact in ways unique to this environment. The author discusses recent projects that use the Net as a performative space of social and aesthetic resonance in which notions of subjectivity, action and production are being articulated and reassessed. This text discusses the notion of “resonance” in order to think through these approaches to network-based art practices.
APA, Harvard, Vancouver, ISO, and other styles
5

CHERIYAN, JO, and G. P. SAJEEV. "m-PageRank: A NOVEL CENTRALITY MEASURE FOR MULTILAYER NETWORKS." Advances in Complex Systems 23, no. 05 (August 2020): 2050012. http://dx.doi.org/10.1142/s0219525920500125.

Full text
Abstract:
A complex network is an explicit model for a real-world system such as technological networks, social networks, business networks, and biological networks. The social network is an Internet-based media for socially relevant activities like stay connected with families and friends, colleagues, and customers, for socializing, business, or both. The key nodes, usually called central nodes, capable of measuring the performance of various social network applications. Identifying influencing nodes is primary research for any network analysis research. Degree centrality, a locally computed metric, is simple to compute but not persuasive. The global metrics like betweenness centrality and PageRank are only useful for the systems with a simple structure, but incur a high computational cost with the addition of layers. This paper proposes a novel metric m-PageRank for ranking nodes in a multi-layer complex network. The m-PageRank is an advancement of PageRank. It integrates the existence of the rank of each layer from where the connection connects. The proposed metric was validated through simulations performed over various multilayer networks. The result shows that m-PageRank computes the rank of each node accurately. We observe that the comparison with state-of-the-art metrics demonstrated the suitability of the proposed metric.
APA, Harvard, Vancouver, ISO, and other styles
6

De la Torre, Gabriel G., Sara Gonzalez-Torre, Carlos Muñoz, and Manuel A. Garcia. "Wireless Computer-Supported Cooperative Work: A Pilot Experiment on Art and Brain–Computer Interfaces." Brain Sciences 9, no. 4 (April 25, 2019): 94. http://dx.doi.org/10.3390/brainsci9040094.

Full text
Abstract:
The present case study looked into the feasibility of using brain–computer interface (BCI) technology combined with computer-supported cooperative work (CSCW) in a wireless network. We had two objectives; first, to test the wireless BCI-based configuration and the practical use of this idea we assessed workload perception in participants located several kilometers apart taking part in the same drawing task. Second, we studied the cortical activation patterns of participants performing the drawing task with and without the BCI technology. Results showed higher mental workload perception and broader cortical activation (frontal-temporal-occipital) under BCI experimental conditions. This idea shows a possible application of BCI research in the social field, where two or more users could engage in a computer networking task using BCI technology over the internet. New research avenues for CSCW are discussed and possibilities for future research are given.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Zhiyuan, Panpan Wu, and Yue Song. "A Fast Reroute Algorithm for Infotainment Service in Internet of Vehicles." International Journal of Distributed Systems and Technologies 7, no. 3 (July 2016): 63–77. http://dx.doi.org/10.4018/ijdst.2016070104.

Full text
Abstract:
Failure recovery in Internet of Vehicles (IoVs) is critical to high quality service provisioning. The main challenge is how to achieve fast rerouting without introducing high complexity and resource usage due to the dynamic topology and the constraints on bandwidth. In this paper, we propose a traffic prediction-based fast reroute algorithm for use among the vehicles in IoVs. The proposed algorithm uses the Wavelet Neural Network (WNN) model to predict a vehicle's network traffic. When the predicted value is greater than the predefined network traffic threshold, both Adaptive Retransmission Trigger (ART) that contributes to switch to a better alternate path in advance and trigger efficient retransmission behaviors are enabled successively. Performance comparison of our proposed algorithm with Ant-based Delay-Sensitive Vehicular Routing (AntVehiNet) shows that WNNPFR can: (a) maximize the service data delivery rate by load balancing, (b) provide high quality of service delivery for multimedia streams by switching to a better path towards a target node in advance, (c) reduce useless data retransmissions when various network failures occur, and (d) maintain lower routing overhead.
APA, Harvard, Vancouver, ISO, and other styles
8

Sanagavarapu, Krishna Chaitanya. "A REVIEW ON CLOUD COMPUTING SERVICES AND CONVERGENCE AMONG CLOUD COMPUTING AND BIG DATA." International Journal of Engineering Technologies and Management Research 6, no. 9 (April 2, 2020): 84–91. http://dx.doi.org/10.29121/ijetmr.v6.i9.2019.454.

Full text
Abstract:
Cloud Computing enables a practical, as needed and also scalable network access to a common swimming pool of configurable computing resources. This paper mainly focuses on a usual technique to integrate the Internet of Things (IoT) as well as Cloud Computer under the name of Cloud Things style. We evaluate the state-of-the-art for integrating Cloud Computer as well as the Internet of Things. The objective is to give a faster as well as easier platform for the customer to get information from an array of sensor nodes that has actually been set-up in a farming system.
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Junyang, Dan Xia, Shiyun Dong, Honghao Zhu, and Binshi Xu. "Research On Pre-Training Method and Generalization Ability of Big Data Recognition Model of the Internet of Things." ACM Transactions on Asian and Low-Resource Language Information Processing 20, no. 5 (July 20, 2021): 1–15. http://dx.doi.org/10.1145/3433539.

Full text
Abstract:
The Internet of Things and big data are currently hot concepts and research fields. The mining, classification, and recognition of big data in the Internet of Things system are the key links that are widely of concern at present. The artificial neural network is beneficial for multi-dimensional data classification and recognition because of its strong feature extraction and self-learning ability. Pre-training is an effective method to address the gradient diffusion problem in deep neural networks and could result in better generalization. This article focuses on the performance of supervised pre-training that uses labelled data. In particular, this pre-training procedure is a simulation that shows the changes in judgment patterns as they progress from primary to mature within the human brain. In this article, the state-of-the-art of neural network pre-training is reviewed. Then, the principles of the auto-encoder and supervised pre-training are introduced in detail. Furthermore, an extended structure of supervised pre-training is proposed. A set of experiments are carried out to compare the performances of different pre-training methods. These experiments include a comparison between the original and pre-trained networks as well as a comparison between the networks with two types of sub-network structures. In addition, a homemade database is established to analyze the influence of pre-training on the generalization ability of neural networks. Finally, an ordinary convolutional neural network is used to verify the applicability of supervised pre-training.
APA, Harvard, Vancouver, ISO, and other styles
10

Ruan, Jinjia, and Dongliang Xie. "Networked VR: State of the Art, Solutions, and Challenges." Electronics 10, no. 2 (January 13, 2021): 166. http://dx.doi.org/10.3390/electronics10020166.

Full text
Abstract:
The networking of virtual reality applications will play an important role in the emerging global Internet of Things (IoT) framework and it is expected to provide the foundation of the expected 5G tactile Internet ecosystem. However, considerable challenges are ahead in terms of technological constraints and infrastructure costs. The raw data rate (5 Gbps–60 Gbps) required achieving an online immersive experience that is indistinguishable from real life vastly exceeds the capabilities of future broadband networks. Therefore, simply providing high bandwidth is insufficient in compensating for this difference, because the demands for scale and supply vary widely. This requires exploring holistic solutions that exceed the traditional network domain, and integrating virtual reality (VR) data capture, encoding, network, and user navigation. Emerging services are extremely inefficient in terms of mass use and data management, which significantly reduces the user experience, due to their heuristic design choices. Other key aspects must be considered, such as wireless operation, ultra-low latency, client/network access, system deployment, edge computing/cache, and end-to-end reliability. A vast number of high-quality works have been published in this area and they will be highlighted in this survey. In addition to a thorough summary of recent progress, we also present an outlook of future developments in the quality of immersive experience networks and unified data set measurement in VR video transmission, focusing on the expansion of VR applications, security issues, and business issues, which have not yet been addressed, and the technical challenges that have not yet been completely solved. We hope that this paper will help researchers and developers to gain a better understanding of the state of research and development in VR.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet (Computer network) in art"

1

Chen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mainville, Sylvie. "Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol Abuse." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278246/.

Full text
Abstract:
This pilot study, grounded in social learning theory, demonstrated that leisure education services can be delivered on the Internet. Participants (n=40) successfully accessed the Web page program and responded to instruments and surveys. The treatment group (n=16) effectively completed four leisure education sessions on-line. Confidentiality, privacy, and anonymity issues were controlled. Responses were monitored and feedback provided as to the complexity of the program and comprehension of the participants. The leisure education program had no significant effect on posttest measures of alcohol expectancies and leisure motivations. Mean changes frompretest to posttest may indicate trends. The small n and convenience sample may have introduced many extraneous variables. Professional implications include compliance issues (57% experimental mortality rate), technology-related anxiety, and limited professional competency to work in this environment. Future research which examines the provision of leisure education and other components of therapeutic recreation service on-line is warranted.
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, Cong Duc. "Creation and distribution of real-time content a case study in provisioning immersive voice communications to networked games /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070110.164837/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Witosurapot, Suntorn, and wsuntorn@fivedots coe psu ac th. "Resolving competition for resources between multimedia and traditional Internet applications." Swinburne University of Technology, 2004. http://adt.lib.swin.edu.au./public/adt-VSWT20050309.123048.

Full text
Abstract:
Although the Internet is the dominant broadband network, it still has a fundamental shortcoming in traffic management that does not properly support efficient use of resources together with differentiated quality of service for mixed traffic types. Even though a number of mechanisms have been proposed under key approaches of resource adaptation, resource reservation, and resource pricing, this problem remains unsolved to date because of its complexity and the way it relates to so many considerations of engineering and economics, and the diverse range of services desired by users. Hence it is considered difficult to devise a perfect mechanism that can universally solve this problem. In this respect, this dissertation contributes to insights into potential combinations and trade-offs of key approaches above in some efficient manner for managing traffic and scarce resources in the Internet. The first part of this work considers the combination of relaxed resource reservation and resource pricing schemes for handling the unfair bandwidth distribution problem in soft-bandwidth guarantee services of the Differentiated Services (DiffServ) Internet. We show that this unfairness problem can be handled using a network-user cooperative approach that addresses both individual user satisfaction and global optimization. We propose to add a mechanism based on price-based feedback signaling to DiffServ-capable routers providing Assured Forwarding (AF) Service so that they can offer per-flow signaling. This still allows them to work at an aggregate traffic level, hence the scalability feature of the DiffServ network can be retained. Our proposed mechanism allows the network to offer reliable service assurances via a distributed optimization algorithm, without introducing special protocols or requiring routers to have access of individual user requirements. Moreover, it can provide incentives for users to cooperate so that optimum performance can be accomplished. This approach has broad applicability and is relevant to all types of assured service classes. The second part of this work considers the combination of a specific resource pricing scheme based on a distributed optimization algorithm and multimedia adaptation schemes. Such a capability has not been available because most utility functions of multimedia applications do not meet the concavity constraints required by optimization algorithm. We proposed to overcome this limitation by redefining user utility functions into equivalent discrete forms and using combinatorial (discrete) optimization so that interfacing the resource-pricing scheme can be done in a normal way. However, to obtain feasible solutions in a scalable manner, an agent is included into the scheme for solving the combinatorial (discrete) optimization on behalf of a small group of users. In return, all users belonging to this group can benefit from social welfare maximization of their utilities over a network resource constraint. The last part of this work considers the combination of relaxed resource reservation and resource pricing schemes to enable a proper charging scheme for adaptive applications in the DiffServ Internet. We provide an optimization formulation of the problems of revenue and social welfare maximization, applied at a service provider (SP) who gives access to the DiffServ Internet. In this scheme, resources are provisioned per QoS-oriented class in a long time scale (service level agreement (SLA) duration), then priced based on user demand in the short time scale. We also show that the proposed charging scheme can provide feedback and incentives for users to use the network resource optimally via the standard packet marking, hence eliminating the need for specific pricing protocol. All of the proposals in this work can be used together, solving these key problems as a coordinated whole, and all use readily available network mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
5

Charles, Joan T. "Teacher-directed student use of the Internet for curricular activities: Profiles of frequent and infrequent use." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3095/.

Full text
Abstract:
The purpose of this study was to develop profiles that described teachers with infrequent and frequent teacher-directed student use of the Internet for curricular purposes. Responses to the teachers' self-reported needs, beliefs, demographics, Internet skill levels, and other information were examined as the basis for the study. The study was descriptive in nature, utilized correlation and causal-comparative methods, and employed a convenience sample. The population consisted of 3,187 public school teachers from Nebraska and four service regions in upstate New York. Data related to the research questions were gathered using an online survey. After minimum access was determined, frequencies, percentages, t tests, and correlations were used to examine the data. Teachers with infrequent (<15 mins. /week) teacher-directed student use of the Internet comprised 63% of the sample. Teachers from elementary and high school levels were almost equally represented in the infrequent use group. The majority of the high school level teachers were assigned to language arts, mathematics or science courses. Teachers in the frequent (>. 90 mins. /week) use group were predominately (75%) high school level, with the majority teaching computer and business subjects. Significant differences were found between the use groups regarding beliefs about the Internet's effect on students and schools and feelings about designing lessons that included the Internet or technology. Within the infrequent use group, significant correlations were found between comparative Internet skill levels and (a) hours of technology-related professional development and (b) willingness to use the Internet for professional development. Further study should be given to the question of how these differences and correlations may affect the amount of teacher-directed student use of the Internet. The profiles developed in this study provide a starting point to assist regional, district, and school-level personnel in assessing local needs and focusing resources on developing strategies to increase teacher-directed student use of the Internet.
APA, Harvard, Vancouver, ISO, and other styles
6

Underwood, Heather, and hjocat@bigpond com. "Who goes there? : demographics, personality and attachment style of those involved in internet affairs." Swinburne University of Technology, 2005. http://adt.lib.swin.edu.au./public/adt-VSWT20051124.091812.

Full text
Abstract:
The overall aim of this thesis was to explore the impact of Internet relationships on regular ongoing relationships from the point of view of those engaged in such relationships. Two studies were conducted. A sample of 75 participants, including 22 females and 53 males who were married or living in defacto relationships and ranging in age from 18 to 75 years completed an anonymous online survey for Study One. Demographic characteristics, frequency and method of communication and relationship satisfaction were investigated. Questions were asked about Internet relationship formation. Respondents were asked to gauge levels of self-disclosure within their regular ongoing relationship and their online relationship. They were also asked about the proximity and physical attractiveness of their online partner. It was found that most respondents communicated daily, were more satisfied with their Internet partner than their regular ongoing partner, considered their Internet partner physically attractive and communicated in a highly intimate manner. The purpose of the second study was to investigate the similarities and differences between the personality characteristics and attachment styles of respondents. Participants in the second study were 133 respondents who were married or living in defacto relationships, including 47 females and 86 males ranging in age from 18 years to 66 years. Respondents completed an anonymous online survey, which included measures of personality (e.g. the International Personality Item Pool, Goldberg, 1999), the Relationship Satisfaction questionnaire (Hendrick, 1988), and the Experiences in Close Relationships Scale (Brennan, Clark, & Shaver, 1998). Respondents were found to be somewhat more agreeable and conscientious, and less narcissistic than previous research had found to be the case for those individuals who engaged in face-to-face infidelity. The preoccupied attachment group was well represented, but was less differentiated from the other attachment groups than was the fearful group, who were mainly female. The personality profile and attachment style of respondents in Study Two was, therefore, found to be different in important ways from that which has been associated with face-to-face infidelity. Findings were discussed in terms of methodological implications, suggestions for future research and also implications for Counselling Psychologists.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
8

Banh, Mai. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070608.094836/index.html.

Full text
Abstract:
Thesis (MEng) - Swinburne University of Technology, Centre for Advanced Internet Architectures, 2005.
[A thesis submitted in total fulfillment of the requirements of for the degree of ] Masters of Engineering by Research, Centre for Advanced Internet Architectures (CAIA), Faculty of Information and Communication Technologies, Swinburne University of Technology, 2005. Typescript. Bibliography p. 153-159.
APA, Harvard, Vancouver, ISO, and other styles
9

Chiam, Kah Min Michael. "Willingness to buy from internet web sites : a suggested model." University of Western Australia. Graduate School of Management, 2006. http://theses.library.uwa.edu.au/adt-WU2006.0014.

Full text
Abstract:
The number of people shopping on the Internet has grown rapidly in recent years and it has been suggested that the growth rate of Internet transactions now exceeds that of traditional retailing. Despite the significant growth in the use of the Internet for business transactions, there is evidence to suggest that many customers abandon web sites without completing their transactions. It is clearly important to understand why people buy from the Internet and also the way consumers examine websites. There had been limited research undertaken to investigate the relationships between the various antecedents and the willingness to buy in the Internet environment, especially within a single study. The main trust of this research is to examine the antecedents that influence the willingness to buy from the Internet and also how these antecedents influence one another. The antecedents included in this research were brand image (Dodds, Monroe & Grewal, 1991), perceived risk (Sweeney & Soutar, 2001), trust (Lynch & Beck, 2001), affect (Lynch & Beck, 2001), convenience (Szymanski & Hise, 2000), relative price (Sweeney, Soutar & Johnson, 1999), site reputation (Baker, Grewal & Parasuraman, 1994) and web design (Szymanski & Hise, 2000). Some of the antecedents were found to be unsuitable and they were dropped from the study. The empirical results from the final model suggest that perceived value is positively influenced by affect and brand image. Both brand image and affect also positively influence the trust of the website. Willingness to buy from the website is influenced by perceived value and trust of the website.
APA, Harvard, Vancouver, ISO, and other styles
10

Kolan, Prakash. "System and Methods for Detecting Unwanted Voice Calls." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5155/.

Full text
Abstract:
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls. There may be unwanted calls from legitimate and known people too. In this case, the unwantedness depends on social proximity of the communicating parties. For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior. The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques. The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls. This inference is based on past mutual behavior between the calling and the called party (i.e., caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee. The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators). These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties. For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC). The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection. In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices. Intelligent hackers can create malicious VoIP traffic for disrupting network activities. Hence, there is a need to frequently monitor the risk levels of critical network infrastructure. Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network. The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques. All the above techniques collectively account for a domain-level VoIP security solution.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet (Computer network) in art"

1

Festival Internacional de Linguagem Eletrônica (1st 2000 São Paulo, Brazil, etc.). Internet art: Digital culture. São Paulo: Paço das Artes, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kehoe, Brendan P. Zen and the art of the Internet: A beginner's guide to the Internet. [Chester, PA]: Kehoe, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kehoe, Brendan P. Zen and the art of the Internet: A beginner's guide to the Internet. [S.l: s.n.], 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

L, Jones David. The art of internet dating: The definitive practical guide to internet dating. Montville, Qld: The author in conjuction with Oracle Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kehoe, Brendan P. Zen and the art of the internet: A beginner's guide. 3rd ed. Englewood Cliffs, N.J: PTR Prentice Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kehoe, Brendan P. Zen and the art of the internet: A beginner's guide. 2nd ed. Englewood Cliffs, NJ: PTR Prentice Hall, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kehoe, Brendan P. Zen and the art of the Internet: A beginner's guide. 4th ed. Upper Saddle River, N.J: Prentice Hall PTR, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wienbroer, Diana Roberts. The McGraw-Hill guide to electronic research in art. Boston: McGraw-Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Art-QoS 2003 (2003 Warsaw, Poland). Architectures for quality of service in the Internet: International workshop, Art-QoS 2003, Warsaw, Poland, March 24-25, 2003 : proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wojciech, Burakowski, Koch Berthold 1947-, and Bȩben Andrzej 1974-, eds. Architectures for quality of service in the Internet: International workshop, Art-QoS 2003, Warsaw, Poland, March 24-25, 2003 : revised papers. New York: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet (Computer network) in art"

1

Cao, Yukun, Zhengyu Zhu, and Chengliang Wang. "Application of a Modified Fuzzy ART Network to User Classification for Internet Content Provider." In Lecture Notes in Computer Science, 725–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11610496_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howser, Gerry. "The Network Layer." In Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Howser, Gerry. "The Laboratory Network." In Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Hamami, Alaa Hussein. "The State of the Art and Future Prospective of the Network Security." In Simulation in Computer Network Design and Modeling, 358–76. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch017.

Full text
Abstract:
The continuous deployment of network services over the wide range of public and private networks has led to transactions and services that include personal, and sometimes quite sensitive, data. Examples of services include: pay-per-view, cable telephony, bill payments by phone, credit card charging, and Internet banking. Such services require significant effort not only to protect the sensitive data involved in the transactions and services but to ensure integrity and availability of network services as well. The requirement for employing heterogeneous networks and systems becomes increasingly important, and as the view of traditional distributed systems has changed to a network centric view in all types of application networks, therefore, the complexity of these systems has led to significant security flaws and problems. Existing conventional approaches for security service development over such complex and most often heterogeneous networks and systems are not satisfying and cannot meet users and applications needs; therefore, several approaches have been developed to provide security at various levels and degrees, such as: secure protocols, secure protocol mechanisms, secure services, firewalls, Intrusion Detection Systems (IDS), and later Intrusion Prevention System (IPS), etc. This chapter considers and addresses several aspects of network security in an effort to provide a publication that summarizes the current status and the promising and interesting future directions and challenges. The authors try to present the state-of-the-art in this chapter for the following topics: Internet security, secure services, security in mobile systems and trust, anonymity, and privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

Bleakley, Chris. "The Internet." In Poems That Solve Puzzles, 117–42. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198853732.003.0007.

Full text
Abstract:
Chapter 7 exposes the algorithms that are the foundations of the Internet. The Internet relies on “packet-switching” to transfer data between computers. Messages are broken into ‘‘packets’’ of data and these packets are routed across the network in a series of hops between linked computers. The advantage of packet-switching is that the network is easily extended and is robust to isolated computer failures. Data sent on the Internet is protected from errors by means of an algorithm invented by Richard Hamming. His algorithm adds information to packets, enabling receiving computers to detect and correct transmission errors. Communication on the Internet is secured by means of an algorithm published in 1977. The RSA algorithm relies on the properties of large prime numbers to prevent eavesdroppers from reading encrypted messages.
APA, Harvard, Vancouver, ISO, and other styles
6

Ibáñez Fernández, Guillermo Agustín. "New Computer Network Paradigms and Virtual Organizations." In Information Resources Management, 2343–52. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-965-1.ch806.

Full text
Abstract:
A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures.
APA, Harvard, Vancouver, ISO, and other styles
7

Rajagopal, Dr. "Internet, Reengineering and Technology Applications in Retailing." In Business Information Systems, 1324–42. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch082.

Full text
Abstract:
The rapid growth in computer technology and commercial needs have allowed significant changes in the information management systems. There emerged in early nineties many commercial network backbones to link with the NSFnet to provide market information to the business firms. The Internet today is a combination of NSFnet and commercially available backbone services disseminating information on the decentralized networks all over the world. It is estimated that there are over 30,000 computer networks connecting over 2 million computers with each other on the Web. In view of the increasing use of electronic information sources through the networks the Transmission Control Protocol/Internet Protocol (TCP/IP) has been designed and made essential for each user networks to abide with the protocol standards which enables the data transfer and retrieval at source.
APA, Harvard, Vancouver, ISO, and other styles
8

Bouras, Christos, Apostolos Gkamas, Dimitris Primpas, and Kostas Stamos. "Quality of Service and Service Level Agreements." In Encyclopedia of Internet Technologies and Applications, 418–24. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch059.

Full text
Abstract:
In order for advanced applications in modern computer networks to function satisfactorily, there is often the need for a guaranteed network performance and guaranteed values for several network parameters. When the provisioning and usage of network services is agreed, relevant specifications for the level of the services are also defined.
APA, Harvard, Vancouver, ISO, and other styles
9

Thiyagarajan, Kirubadevi, Ramamoorthy S, Neelavathy Pari S, and Rajakumar P S. "Device Authentication and Secure Routing in MANET for Internet of Things." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200159.

Full text
Abstract:
In the next generation of communication mobile adhoc network (MANET) will play a major role in Internet of Things (IoT).MANET can be defined as a network among a group of nodes with no infrastructure. Internet of Things is the composition of a variety of networks like Wi-Fi, ZigBee, Wireless Sensor Networks (WSNs). MANETs, and Radio Frequency Identifier (RFID). There is a need for the compatibility of MANET with IoT for the deployment of smart infrastructure. Authenticity and security in communication between devices are essential for the realization of IoT with MANET. Authentication and providing security in MANET are always challenging due to its mobility in nature. Devices in IoT are usually resource constrained in energy, memory, computation and bandwidth. Therefore, it is difficult for each node to authenticate all the devices in the network. In this paper, an authentication scheme is proposed without any third party provider to distinguish the authorized and unauthorized devices. This authentication consists of two level process; in the 1st level mutual devices are authenticated, and in the 2nd level secure data routing between the devices is carried out. Mutual authentication is performed by Clustering based on keys and unique identities and by the cluster heads interpreting for secure routing. This scheme ensures the early measure of authenticity for the message requested enters into the IoT networks and disagreement against attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Hussain, Mirza Waseem, Sanjay Jamwal, Tabasum Mirza, and Malik Mubasher Hassan. "Taxonomy of Computer Network Congestion Control/Avoidance Methods." In Managing Resources for Futuristic Wireless Networks, 178–212. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-5225-9493-2.ch008.

Full text
Abstract:
The communication platform in the computing field is increasing at a rapid pace. Technology is constantly budding with the materialization of new technological devices, specifically in the communication industry. The internet is expanding exponentially. Internet-enabled devices are becoming part and parcel of our daily lives. It has turned out to be almost impossible to think about the world without the internet. The internet structures might be reinforced to meet coming prerequisites in mobile communication. Congestion plays a vital role in regulating the flow of data to accelerate the exchange of data in between the wired and wireless devices. In this chapter, the authors try to highlight various network congestion techniques with their limitations proposed from time to time by various researchers. This chapter plays a vital role in highlighting the history of networking congestion detection/avoidance techniques starting from the early days of networking.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet (Computer network) in art"

1

Krummacker, Dennis, Christoph Fischer, Khurshid Alam, Michael Karrenbauer, Sergiy Melnyk, Hans Dieter Schotten, Peng Chen, and Siyu Tang. "Intra-Network Clock Synchronization for Wireless Networks: From State of the Art Systems to an Improved Solution." In 2020 2nd International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2020. http://dx.doi.org/10.1109/iccci49374.2020.9145977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dang, Trung D. Q., Thien Do, Anh Nguyen, Van Pham, Quoc Nguyen, Bach Hoang, and Giao Nguyen. "Correspondence Neural Network for Line Art Colorization." In SIGGRAPH '20: Special Interest Group on Computer Graphics and Interactive Techniques Conference. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3388770.3407418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Emdas, Rabea, and Ahmed Alruwaili. "What are the Aspects of Adopting Computer-Based Exams and do they Impact Negatively on Students?" In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110808.

Full text
Abstract:
Computer-based exams (CBEs) have been used in various courses, such as schools, universities and other training centres. As there are many educational institutions which have chosen to convert from paper test system to computer- based exam. However, adopting computer tests may lead to some difficulties for the students, which relates to technical defects and lake of computer skills of some students when they applying the computer based exams. The purpose of the essay was to determine negative and positive effects on the students of using computer-based exams and focus on some of suggesting solutions to the negative effects, such the exams to make continuous use of computer- based possible. In the first section the computer test, which could cause negative effects on students due to various levels of skills to use computer and some technical problems was examined. The design of the computer examination system requires careful planning and study from several aspects before becoming officially accepted, the computer-based exams still have a few problems which may lead to difficulties in using computer exams. Then the many benefits which could be gained by using computer-based exams, such as the student will be more independent with computer test were described. In addition, the students have accessible to the exams through the internet network. Finally, the effectiveness of certain strategy to solve the negative effects of computer-based exams were argued. developing the solutions of the technical problems are required for computer test, where improving the input methods questions and corrections. It was concluded that the computer exam, with adjustments, is more suitable for students.
APA, Harvard, Vancouver, ISO, and other styles
4

Santos, Bruno Pereira, Luiz Filipe Menezes Vieira, and Antonio Alfredo Ferreira Loureiro. "Routing and Mobility Management in the Internet of Things." In XXXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc_estendido.2020.12415.

Full text
Abstract:
This Ph.D. Thesis proposes new techniques for routing and mobility management for Internet of Things (IoT). In the future IoT, everyday mobile objects will probably be connected to the Internet. Currently, static IoT's devices have already been connected, but handle mobile devices suitably still being an open issue in IoT context. Then, solutions for routing mobility detection, handover, and mobility management are proposed through an algorithm that integrates Machine Learning (ML) and mobility metrics to figure out devices' mobility events, which we named Dribble. Also, an IPv6 hierarchical routing protocol named Mobile Matrix to boost efficient (memory and fault tolerance) end-to-end connectivity over mobility scenarios. The Thesis contributions are supported by numerous peer-reviewed publications in national and international conferences and journals included in ISI-JCR. Also, the applicability of this Thesis is evident by showing that our results overcome state-of-the-art in static and mobile scenarios, as well as, the impact of the proposed solutions is a step forward in at least two new research areas so-called Internet of Mobile Things (IoMT) and Social IoT, where devices move around and do social ties respectively. Moreover, during the Ph.D. degree, the author has contributed to different computer network fields rather than routing by publishing in areas like social networks, smart cities, intelligent transportation systems, software-defined networks, and parallel computing.
APA, Harvard, Vancouver, ISO, and other styles
5

Zaliwski, Andrzej. "Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2857.

Full text
Abstract:
The business organizations currently functioning inside cyberspace are vulnerable to threats and forms of crimes that were unknown prior to the Internet era. New challenges for security have emerged from this situation. It has become increasingly necessary to educate a large number of professionals to be better prepared to maintain the growing number of computer networks. Also, there is a need to place strong emphasis on the security aspects of a network. These goals are impossible to realize without solving the following problems: lack of safe infrastructure, where security experiments can not compromise the organization’s security; and the complexity of existing security auditing methodologies which limits the number of professionals who are able to use them. The complexity makes difficult to obtain a bird-eye view of the whole company’s security system in a way similar to tactical and strategic military map. This hinders the ability to have a single complete status of an organization. This paper describes a tool that can be used to overcome the above problems.
APA, Harvard, Vancouver, ISO, and other styles
6

Leonardo Costa, Wanderson, Ariel Lima de Carvalho Portela, and Rafael Lopes Gomes. "Análise de Características do Tráfego de Rede para Detecção de Ataques DDoS em Ambientes IoT." In Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p217-224.

Full text
Abstract:
The evolution of computing devices has allowed the evolution ofservice provision in society, applying new technologies based onthe Internet of Things (IoT). Most IoT devices have security vulnerabilities,making them susceptible to Distributed Denial of Service(DDoS) Attacks. Thus, it is necessary to apply solutions that candetect this type of attack in IoT networks from the information ofthe network traffic. However, there is still no definition of whichtraffic characteristics should be used for detection, since the useof inappropriate characteristics tend to make detection difficult.Within this context, this article presents an analysis of the most importanttraffic characteristics for detecting DDoS in IoT networks,in order to support a detection mechanism based on Machine Learning.Experiments using a real data set suggest that the proposedmechanism has an accuracy close to 99 % when the most suitablecharacteristics are selected.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Jae Yeol, Joo-Haeng Lee, Hyun Kim, and Hyung Sun Kim. "Progressive Solid Models for Internet-Based Design and Collaboration." In ASME 2002 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/detc2002/cie-34457.

Full text
Abstract:
Progressive mesh representation and generation have become one of the most important issues in network-based computer graphics. However, current researches are mostly focused on triangular mesh models. On the other hand, solid models are widely used in industry and are applied to advanced applications such as product design and virtual assembly. Moreover, as the demand to share and transmit these solid models over the network is emerging, the representation and the generation of progressive solid models depending on specific engineering needs and purpose are essential. In this paper, we present a Cellular Topology-based approach to generating progressive solid models from a feature-based solid model for internet-based design and collaboration. The proposed approach introduces a new scheme for storing and transmitting solid models over the network. The Cellular Topology (CT) approach makes it possible to effectively generate progressive solid models and to efficiently transmit the models over the network with compact model size. Thus, an arbitrary solid model SM designed by a set of design features is stored as a much coarser solid model SM0 together with a sequence of n detail records that indicate how to incrementally refine SM0 exactly back into the original solid model SM = SMn.
APA, Harvard, Vancouver, ISO, and other styles
8

Angulo, Marlenne, and Marco Turrubiartes. "On-Line Education in Computer Networks Courses. Study Case: UABC University." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2652.

Full text
Abstract:
Currently, distance learning is increasing its application in Mexican Universities; despite that it is not enough to satisfy the demand of higher education in Mexico. This paper presents a comparative analysis of undergraduate student performance in two systems: face-to-face and On-Line education. This analysis was realized with two different courses: Local area network and Interconnectivity. These two courses are part of the Computer Engineering curricula. The results show two important issues: the students are more participative and the team work is improved in the on-line class. The original idea of this work was to quantitatively evaluate face to face and On-line educational systems applied in computer networks. Finally they could not be compared in that manner. Both systems are options that the students have, and according to their profile they can choose the most convenient alternative. Finally, the Internet is a tool, it does not give better or worse education by itself, it has some advan-tages/disadvantages that should be taken into account when an On-Line course is designed.
APA, Harvard, Vancouver, ISO, and other styles
9

Ruiz, Daniel, Gabriel Salomon, and Eduardo Todt. "Can Giraffes Become Birds? An Evaluation of Image-to-image Translation for Data Generation." In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2020. http://dx.doi.org/10.14210/cotb.v11n1.p176-182.

Full text
Abstract:
There is an increasing interest in image-to-image translation withapplications ranging from generating maps from satellite images tocreating entire clothes’ images from only contours. In the presentwork, we investigate image-to-image translation using GenerativeAdversarial Networks (GANs) for generating new data, taking as acase study the morphing of giraffes images into bird images. Morphinga giraffe into a bird is a challenging task, as they have differentscales, textures, and morphology. An unsupervised cross-domaintranslator entitled InstaGAN was trained on giraffes and birds,along with their respective masks, to learn translation betweenboth domains. A dataset of synthetic bird images was generatedusing translation from originally giraffe images while preservingthe original spatial arrangement and background. It is important tostress that the generated birds do not exist, being only the result of alatent representation learned by InstaGAN. Two subsets of commonliterature datasets were used for training the GAN and generatingthe translated images: COCO and Caltech-UCSD Birds 200-2011.To evaluate the realness and quality of the generated images andmasks, qualitative and quantitative analyses were made. For thequantitative analysis, a pre-trained Mask R-CNN was used for thedetection and segmentation of birds on Pascal VOC, Caltech-UCSDBirds 200-2011, and our new dataset entitled FakeSet. The generateddataset achieved detection and segmentation results close tothe real datasets, suggesting that the generated images are realisticenough to be detected and segmented by a state-of-the-art deepneural network.
APA, Harvard, Vancouver, ISO, and other styles
10

Попова, Екатерина, Ekaterina Popova, Владимир Спицын, Vladimir Spicyn, Юлия Иванова, and Yuliya Ivanova. "Using artificial neural networks to solve text classification problems." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-1-270-273.

Full text
Abstract:
The article is devoted to neural network text classification algorithms. The relevance of this topic is due to the ever-growing volume of information on the Internet and the need to navigate it. In this paper, in addition to the classification algorithm, a description is also given of the methods of text preprocessing and vectorization, these steps are the starting point for most NLP tasks and make neural network algorithms efficient on small data sets. In the work, a sampling of 50,000 English IMDB movie reviews will be used as a dataset for training and testing the neural network. To solve this problem, an approach based on the use of a convolutional neural network was used. The maximum achieved accuracy for the test sample was 90.16%.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet (Computer network) in art"

1

Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
3

Patel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41042.

Full text
Abstract:
Bio-structures owe their remarkable mechanical properties to their hierarchical geometrical arrangement as well as heterogeneous material properties. This dissertation presents an integrated, interdisciplinary approach that employs computational mechanics combined with flow network analysis to gain fundamental insights into the failure mechanisms of high performance, light-weight, structured composites by examining the stress flow patterns formed in the nascent stages of loading for the rostrum of the paddlefish. The data required for the flow network analysis was generated from the finite element analysis of the rostrum. The flow network was weighted based on the parameter of interest, which is stress in the current study. The changing kinematics of the structural system was provided as input to the algorithm that computes the minimum-cut of the flow network. The proposed approach was verified using two classical problems three- and four-point bending of a simply-supported concrete beam. The current study also addresses the methodology used to prepare data in an appropriate format for a seamless transition from finite element binary database files to the abstract mathematical domain needed for the network flow analysis. A robust, platform-independent procedure was developed that efficiently handles the large datasets produced by the finite element simulations. Results from computational mechanics using Abaqus and complex network analysis are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Yatsymirska, Mariya. SOCIAL EXPRESSION IN MULTIMEDIA TEXTS. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11072.

Full text
Abstract:
The article investigates functional techniques of extralinguistic expression in multimedia texts; the effectiveness of figurative expressions as a reaction to modern events in Ukraine and their influence on the formation of public opinion is shown. Publications of journalists, broadcasts of media resonators, experts, public figures, politicians, readers are analyzed. The language of the media plays a key role in shaping the worldview of the young political elite in the first place. The essence of each statement is a focused thought that reacts to events in the world or in one’s own country. The most popular platform for mass information and social interaction is, first of all, network journalism, which is characterized by mobility and unlimited time and space. Authors have complete freedom to express their views in direct language, including their own word formation. Phonetic, lexical, phraseological and stylistic means of speech create expression of the text. A figurative word, a good aphorism or proverb, a paraphrased expression, etc. enhance the effectiveness of a multimedia text. This is especially important for headlines that simultaneously inform and influence the views of millions of readers. Given the wide range of issues raised by the Internet as a medium, research in this area is interdisciplinary. The science of information, combining language and social communication, is at the forefront of global interactions. The Internet is an effective source of knowledge and a forum for free thought. Nonlinear texts (hypertexts) – «branching texts or texts that perform actions on request», multimedia texts change the principles of information collection, storage and dissemination, involving billions of readers in the discussion of global issues. Mastering the word is not an easy task if the author of the publication is not well-read, is not deep in the topic, does not know the psychology of the audience for which he writes. Therefore, the study of media broadcasting is an important component of the professional training of future journalists. The functions of the language of the media require the authors to make the right statements and convincing arguments in the text. Journalism education is not only knowledge of imperative and dispositive norms, but also apodictic ones. In practice, this means that there are rules in media creativity that are based on logical necessity. Apodicticity is the first sign of impressive language on the platform of print or electronic media. Social expression is a combination of creative abilities and linguistic competencies that a journalist realizes in his activity. Creative self-expression is realized in a set of many important factors in the media: the choice of topic, convincing arguments, logical presentation of ideas and deep philological education. Linguistic art, in contrast to painting, music, sculpture, accumulates all visual, auditory, tactile and empathic sensations in a universal sign – the word. The choice of the word for the reproduction of sensory and semantic meanings, its competent use in the appropriate context distinguishes the journalist-intellectual from other participants in forums, round tables, analytical or entertainment programs. Expressive speech in the media is a product of the intellect (ability to think) of all those who write on socio-political or economic topics. In the same plane with him – intelligence (awareness, prudence), the first sign of which (according to Ivan Ogienko) is a good knowledge of the language. Intellectual language is an important means of organizing a journalistic text. It, on the one hand, logically conveys the author’s thoughts, and on the other – encourages the reader to reflect and comprehend what is read. The richness of language is accumulated through continuous self-education and interesting communication. Studies of social expression as an important factor influencing the formation of public consciousness should open up new facets of rational and emotional media broadcasting; to trace physical and psychological reactions to communicative mimicry in the media. Speech mimicry as one of the methods of disguise is increasingly becoming a dangerous factor in manipulating the media. Mimicry is an unprincipled adaptation to the surrounding social conditions; one of the most famous examples of an animal characterized by mimicry (change of protective color and shape) is a chameleon. In a figurative sense, chameleons are called adaptive journalists. Observations show that mimicry in politics is to some extent a kind of game that, like every game, is always conditional and artificial.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography