Academic literature on the topic 'VPN connections'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VPN connections.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "VPN connections"

1

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
APA, Harvard, Vancouver, ISO, and other styles
2

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
3

Harika Rama Tulasi Karatapu and Vishal Gudhka. "Secure hybrid connectivity with private service connects and zero trust on-premises integration." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 4272–90. https://doi.org/10.30574/wjarr.2025.26.2.2108.

Full text
Abstract:
Managing secure connections between cloud servers and internal equipment has become a main concern when companies move parts of their operations to hybrid cloud models. Modern network systems based on perimeter protection do not work against current cyber risks. This document presents a secure hybrid connection plan that combines Private Service Connect and Zero Trust On-Premises [10] Integration with IPSec VPN tunnels to enhance network security. Private Service Connect [4] creates safe private links between local networks and cloud services which protect data as it moves away from open internet connections to reduce exposure to unauthorized access. Zero Trust security confirms network traffic security both from within and outside the organization by constantly checking and encrypting every packet. Our new security procedures require authorization checks for every connection despite existing interpersonal relationships. We will focus on IPSec VPN tunnels because they protect hybrid connectivity from harm. Network connections using IPSec technology guard the communication link from cloud servers to on-premises equipment. The study explains how VPN tunnels make different cloud environments connect better and discusses why this helps hybrid cloud systems run more securely. This paper presents an all-inclusive security framework that safeguards data properly while facing security threats and meeting national and international compliance standards. We achieve this by integrating Private Service Connect with Zero Trust protocol and IPSec VPN tunnelling methods. The research evaluates best security methods and shares practical examples to show working hybrid cloud implementation techniques. This research offers IT executives and cybersecurity teams practical guidelines to create a hybrid connectivity system that provides safe and fast service at scale for modern business security requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Hidayat, Sahrul, and Yuma Akbar. "IMPLEMENTASI FAILOVER VPN KANTOR PUSAT DAN CABANG MENGGUNAKAN TEKNOLOGI SDWAN DENGAN STRATEGI BEST QUALITY." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (2023): 1598–608. http://dx.doi.org/10.35870/jimik.v4i3.386.

Full text
Abstract:
Head office and branch VPN networks are used to connect the head office with branches spread across geographically separated areas. However, network security and availability can be affected by various factors, such as internet connection failures, excessive bandwidth usage, and other disturbances. To overcome this, researchers provide a solution for implementing Failover VPN at the head office and branches using SDWAN technology. With SDWAN, companies can choose a connection path that is more reliable and has a higher speed, thereby optimizing bandwidth usage and improving network availability. In this study, researchers tried to simulate Headquarters and Branch Office VPN Failover Using SDWAN Technology with the Best Quality Strategy at PNETLab. This study uses 2 connections, namely internet connection and MPLS. MPLS is Primary and the internet as Backup. The test is carried out using three schemes, scheme 1 when in normal conditions, scheme 2 when the packet loss on the MPLS link increases then traffic is taken over by the internet connection, and scheme 3 when the packet loss on the MPLS link returns to normal.
APA, Harvard, Vancouver, ISO, and other styles
5

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from intercepting it. Without a VPN, all your internet traffic is potentially exposed to your internet service provider (ISP), the government, advertisers, or other people on your network. That’s why VPN connections boost your privacy and security online. VPN is virtual because it’s created digitally there isn’t a physical cable that reaches from your device directly to the VPN server.
APA, Harvard, Vancouver, ISO, and other styles
6

Domakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.

Full text
Abstract:
This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site-to-Site" (pre-configured IP clients) VPN connections. In addition to discussing upcoming scalability and usability improvements, this paper covers the technical design, implementation, and testing strategies for the Remote Access VPN feature.
APA, Harvard, Vancouver, ISO, and other styles
7

Harsapranata, Agni Isador. "IMPLEMENTASI FAILOVER MENGGUNAKAN JARINGAN VPN DAN METRONET PADA ASTRIDOGROUP INDONESIA." CCIT Journal 8, no. 2 (2015): 66–77. http://dx.doi.org/10.33050/ccit.v8i2.321.

Full text
Abstract:
The purpose of this research is to build a network that connects the head office and branch offices Astridogroup Indonesia, with the hope of the entire performance can be improved connections to support business objectives. To meet these needs and the failures of communication technology that was used, in which the technology is to use a connection that can always be online in the hope of quality of service close to 100%. The technology used is to use two connection lines, the first is to use optical fiber Metronet, and the second VPN using wifi internet, so that if one connection dies , the another connection would be a backup, to set both the connection failover using mikrotik router.
APA, Harvard, Vancouver, ISO, and other styles
8

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden and external connections prohibited. The influence of a virtual private network (VPN) on a standard network's performance is studied by producing and assessing CBR, HTTP, and FTP payloads. The evaluation used throughput and time delay as performance measures after analysis of the finding, deep learning (DL) can predict attacks. Because that learns attack patterns during training to effectively forecast attacks. To detect attacks, deep learning-based attack prevention model was created This method uses Nave Bayes and FFNN to enhace network performance. The results show that VPNs affect packet latency and performance differently depending on the data type. The FFNN algorithm detects intrusions with 98% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
9

Alqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (2024): 4421. http://dx.doi.org/10.3390/app14114421.

Full text
Abstract:
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) for classifying VPN traffic, aiding forensic investigators in precisely identifying applications or websites accessed via VPN connections. By leveraging the combined strengths of CNNs and GNNs, our method provides an effective solution for discerning user activities during VPN sessions. Further extending this framework, we incorporate blockchain technology to meticulously record all mobile VPN transactions, ensuring a tamper-proof and transparent ledger that significantly bolsters the integrity and admissibility of forensic evidence in legal scenarios. A specific use-case demonstrates this methodology in mobile forensics, where our integrated approach not only accurately classifies data traffic but also securely logs transactional details on the blockchain, offering an unprecedented level of detail and reliability in forensic investigations. Extensive real-world VPN dataset experiments validate our approach, highlighting its potential to achieve high accuracy and offering invaluable insights for both technological and legal domains in the context of mobile VPN usage.
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Rashmi, Mrudula Nimbarte, and Sachin Jain. "Cloud Based Remote Service Provider for Village Empowerment." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 01 SPL (2022): 20–24. http://dx.doi.org/10.18090/samriddhi.v14spli01.4.

Full text
Abstract:
Remote Service Provider (RSP) is a device which will provide intranet or networking facilities in remote or village area. With the use of Virtual Private Network (VPN) connections with the company’s distant node can be established, so that the work could be done right from the remote area or village area. Services based on cloud can also be used once network connection is established. The device) will act as a bridge between village or remote area and city making village or remote area socially powerful as city is.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "VPN connections"

1

Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.

Full text
Abstract:
<p> VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation. </p><p> This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible. </p><p> The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner&rsquo;s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.</p><p>
APA, Harvard, Vancouver, ISO, and other styles
2

Lamichhane, Udit. "Numerical Analysis of Cracked Aluminum and Steel Connection by ANSYS." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544738026833242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hurtig, Andreas, Thomas Gisslar, and Alexander Karlsson. "Vilken mjukvarubaserad fjärranslutningslösning är passande för ett mindre företag?" Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-1974.

Full text
Abstract:
<p> </p><p>Syftet med denna undersökning är att ta reda på vilken mjukvarubaserad fjärranslutningslösning som passar för ett mindre företag, då de har mindre ekonomiska tillgångar än ett större företag behöver de vara mer noggranna med sina produktval. Arbetet är utfört med litteraturstudier och en enkätundersökning till ett tiotal mindre företag, samt en laborationsmiljö där tester av de olika fjärranslutningslösningarnas egenskaper har utförts.</p><p>Område valdes då ämnet fjärranslutning knappt behandlads under utbildningstiden, och fördjupar sig därför inom området.</p><p>Resultatet visar vad mindre företag anser vara de viktigaste egenskaperna med en fjärranslutningslösning. Även de värden som uppkom vid tester i laborationsmiljön kommer att presenteras i resultatet. De samlade resultaten kommer sedan visa på vilken mjukvarubaserad lösning som passar bäst för ett mindre företag.</p><p> </p><br><p><p>The purpose of this survey is to figure out which software based remote access solution that fits a smaller company, hence they have less economy assets than a larger company they need to be more thorough with their products of choice. The work is performed with literature studies and a survey of a dozen smaller companies, and also a laboratory environment where properties of the different remote access solutions are performed.</p><p>This area was chosen because the subject of remote access scarcely was treated during our education, and become engrossed in this area.</p><p>The result shows what the companies consider to be the most important properties with a remote access and also the products results from the tests. Also the values that occurred during testing in a laboratory environment will be presented in the results. The combined results will then show which software-based solution that is best suited for a small company.</p></p>
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, Shiguang. "Beitrag zum Ermitteln von Prioritätsstufen zur fahrtkonkreten Beeinflussung von Lichtsignalanlagen und zur Anschlusssicherung im ÖPNV." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-99454.

Full text
Abstract:
In der vorliegenden Arbeit wurden Verfahren entwickelt und getestet, um Prioritätsstufen für öffentliche Verkehrsmittel zur fahrtkonkreten Beeinflussung von Lichtsignalanlagen zu ermitteln und darüber hinaus Anschlüsse im öffentlichen Personennahverkehr zu sichern. Die Testergebnisse zeigen, dass die Ziele, eine höhere Pünktlichkeit und eine höhere Anschlusssicherheit, sehr gut erreicht werden.
APA, Harvard, Vancouver, ISO, and other styles
5

Paquette, Megan. "Migraine auras and hypergraphia and their connection to Hildegard Von Bingen." Honors in the Major Thesis, University of Central Florida, 2001. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/244.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.<br>Bachelors<br>Arts and Sciences<br>Art History
APA, Harvard, Vancouver, ISO, and other styles
6

Pesce, Amanda-Josephine Michelle. "Rogier van der Weyden: A Netherlandish Artist and the Ferrarese Court." Master's thesis, Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/416615.

Full text
Abstract:
Art History<br>M.A.<br>Northern European and Italian Renaissance art have tended to be treated art historically as two opposing styles. Rooted in statements by artists such as Michelangelo and Leon Battista Alberti, it has become a common misconception that Italians did not hold Northern European art in high regard during the late fifteenth and early sixteenth centuries. This thesis seeks to complicate and critique this conventional understanding by looking at the similarities and transalpine exchanges between the artistic styles and practices of Rogier van der Weyden (c. 1400-1464) of Brussels and Cosmè Tura (c. 1430-1495) of Ferrara. By looking at the writings of contemporary humanists at the Ferrarese court and technical analysis of select paintings, it is evident that Cosmè Tura strove to emulate and incorporate aspects of Rogier van der Weyden’s northern manner, especially in his handling of oil paint, use of underdrawings, and emotive effects. By reconsidering this cross-cultural relationship, this thesis demonstrates that the traditionally constructed animosity between Northern and Southern Renaissance art is a common misperception and a oversight in art history.<br>Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
7

Jakel, Roland. "Analysis of Bolted Connections in Creo Simulate - Theory, Software Functionality and Application Examples." Universitätsbibliothek Chemnitz, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-114533.

Full text
Abstract:
Die Präsentation stellt kurz die Grundlagen der Berechnung von Schraubenverbindungen in Anlehnung an die VDI-Richtlinie 2230 Teil 1 dar. Auch die vier FEM-Modellklassen, die die VDI 2230 Teil 2 (Entwurf) zur Berechnung von Mehrschraubenverbindungen vorschlägt, werden behandelt, und die in Creo Simulate vorhandenen Softwarefeatures zu deren Umsetzung vorgestellt. Es folgt eine Darstellung, was bei der Linearisierung von Schraubenverbindungen zur vereinfachten Berechnung zu beachten ist, und wieso bei der Berechnung im FEM-System dann nicht notwendigerweise eine Vorspannung benötigt wird. Ausführlich wird das neue Schraubenfeature in Creo Simulate betrachtet, das eine weitgehend automatisierte Modellierung und Berechnung von Standardverschraubungen erlaubt. Weitere Features, wie die neuen Vorspannelemente, werden erläutert, sowie auch die Grenzen der Software aufgezeigt. Abschließend werden zwei anspruchsvolle Anwendungsbeispiele vorgestellt: Eine zentrisch belastete Verschraubung mit Berücksichtigung von Elasto-Plastizität und einer komplexen Lasthistorie (Anziehen durch Anzugsmoment, Setzeffekte, Entfall des Torsionsmomentes durch das Anziehen, Betriebskraft) sowie eine exzentrisch belastete Verschraubung, die wegen eines relativ dünnen Flansches starke Biegezusatzbeanspruchungen erfährt<br>The presentation shows the foundations of bolt analysis according to VDI-guideline 2230 part 1. In addition, the four FEM model classes proposed in VDI 2230 part 2 (draft) are described, as well as the features available in Creo Simulate to realize these model classes. Next, the presentation shows the requirements for linearizing bolted connections, and why in a FEM analysis with a linearized connection no preload is necessary. The new fastener feature introduced in Creo Simulate is explained in detail. This feature allows the automated modeling and analysis of bolted connections having standard geometry. Further software features, like pretension elements, as well as the current software limitations are shown. Finally, two advanced application examples are shown: A centrically loaded bolted connection taking into account elasto-plasticity and a complex load history (tightening torque, embedding, removal of tightening stress, operational load), and an eccentrically loaded flange connection, which is subjected to high additional bending loads because the flange is relatively thin
APA, Harvard, Vancouver, ISO, and other styles
8

Schönewolf, Nicola. "Mutationen in der Connection und RNAse H-Domain der Reversen Transkriptase von HIV-1." Diss., lmu, 2010. http://nbn-resolving.de/urn:nbn:de:bvb:19-121176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hwang, Kyung Ju [Verfasser]. "Advanced investigations of grid spatial structures considering various connection systems / vorgelegt von Kyung Ju Hwang." Stuttgart : ITKE, 2010. http://d-nb.info/1003202845/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Watkins, Emily Stuart. "“That I should always listen to my body and love it”: Finding the Mind-Body Connection in Nineteenth- and Twentieth-Century Slave Texts." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/2363.

Full text
Abstract:
This thesis explores the presence of the movement theories of Irmgard Bartenieff, Peggy Hackney, and Rudolf Von Laban in the following texts: Narrative of the Life of Frederick Douglass, An American Slave. Written by Himself (1845), The History of Mary Prince: A West Indian Slave (1831), Incidents in the Life of a Slave Girl, Written by Herself, Linda Brent (1861), Sherley Anne Williams’s Dessa Rose (1986) and Toni Morrison’s Beloved (1987). The terms and phrases of movement theory will be introduced to the contemporary critical discussion already surrounding the texts, both furthering and challenging existing arguments.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "VPN connections"

1

1951-, Macdonald Cynthia, and Macdonald Graham, eds. Connectionism. Blackwell Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Walton, W. W. The Van Gogh connection. Daisy Wheel Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bieber, Klaus. Theoretische Überlegungen zur Klassifikation von Konnektoren im Französischen. P. Lang, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maik, Walter, ed. Der Ausdruck von Kausalität im Deutschen: Eine korpusbasierte Studie zum Zusammenspiel von Konnektoren, Kontextmerkmalen und Diskursrelationen. Institut für Deutsche Sprache, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Michaelis, Suzanne. Komplexe Syntax im Seychellen-Kreol: Verknüpfung von Sachverhaltdarstellungen zwischen Mündlichkeit und Schriftlichkeit. G. Narr, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Köster, Lothar. Von Saussure zum Konnektionismus: Struktur und Kontinuität in der Lexemsemantik und der Musiksemiotik. DUV, Deutscher Universitäts Verlag, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

William, Ramsey, Stich Stephen P, and Rumelhart David E, eds. Philosophy and connectionist theory. L. Erlbaum Associates, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wilson, Gladys Ophelia Mitchell. The Mitchell, Van Meter, Clay connection: A pictorial genealogy. Xyan, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eynden, Caroline Van den. Caroline Van den Eynden: Connection between memory and desire. C. Van den Eynden, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Breindl, Eva, and Annette Klosa. Funktionswörter, Buch, Forschung: Zur lexikographischen Darstellung von Partikeln, Konnektoren, Präpositionen und anderen Funktionswörtern. G. Olms, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "VPN connections"

1

Watrelot, Michaela. "The Power of Connections." In Wilhelm von Bode and the American Art Market. Routledge, 2023. http://dx.doi.org/10.4324/9781003385394-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Munns, Geoff. "Van Morrison – Place and Literary Connections." In The Places of Van Morrison’s Songwriting. Routledge, 2022. http://dx.doi.org/10.4324/9781003282952-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gertz, Oliver. "Das Zeitalter von Content & Connections." In Realtime Advertising. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-05358-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Helfrich, Thomas, and Gerald Stei. "Lessons Learnt beim Relaunch von Connections@Bayer." In Enterprise Social Networks. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-12652-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hotzel, E. "Connection structures — a component of parallel programming languages." In Architektur und Betrieb von Rechensystemen. Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-73451-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gihr, O., and P. J. Kuehn. "Comparison of Communication Services with Connection-Oriented and Connectionless Data Transmission." In Messung, Modellierung und Bewertung von Rechensystemen. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-642-87472-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

van Heuven, Walter J. B., and Ton Dijkstra. "Chapter 5. Cross-language influences in L2 visual word processing." In Cross-language Influences in Bilingual Processing and Second Language Acquisition. John Benjamins Publishing Company, 2023. http://dx.doi.org/10.1075/bpa.16.05van.

Full text
Abstract:
Over the last decades, a variety of verbal models have been proposed to account for empirical findings on bilingual word processing and second language (L2) acquisition. However, in these domains only a small number of computational models have seen the light, including localist connectionist models like the Bilingual Interactive Activation (BIA) model (Dijkstra &amp; van Heuven, 1998; van Heuven et al., 1998), the Bilingual Interactive Activation + (BIA+) model (Dijkstra &amp; van Heuven, 2002), and Multilink(+) (Dijkstra et al., 2019; 2022a). In this chapter, we review structural and processing characteristics of these models, such as input coding, lateral inhibition, word frequency, language nodes, and task demands. Finally, advantages and limitations of current computational models are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Lee, Jade Lee, J. C. Leapman, and Ann Rainey-Ruiz. "Making Connections: Pandemic-Era Lessons from a Maker-Centered University–Community Partnership." In University-Community Partnerships for Transformative Education. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60583-3_9.

Full text
Abstract:
AbstractBeta Lab Links connects UC Davis faculty and students with young people in the region to support them in imagining, designing, and building “maker” projects of their own choosing. The idea of “making” is broad and has a long history, but it has recently become associated with playful tinkering and design work that combines low-tech craft technologies (e.g., sewing, woodworking, and papercraft) with high-tech tools (e.g., microcontrollers, 3-D printers, software design). Advocates of maker-centered education emphasize its potential to foster STEM identity, knowledge, and skill development in a fun and inclusive environment.Typically, Beta Lab Links work in person at the schools or community centers youth already attend, using a mobile maker van to create “pop-up” making spaces. During COVID-19 closures, Beta Lab Links collaborated with the Boys &amp; Girls Club of Greater Sacramento to distribute maker kits to families and hold weekly online sessions with upper elementary-school-aged youth. These activities focused primarily on papercraft and electronics, as these were novel, STEM-rich, and did not require additional tools.This chapter shares Beta Lab’s core pedagogical commitments and explores how the move online provided a catalyst for reflection and new insights into processes of connection and community through making.
APA, Harvard, Vancouver, ISO, and other styles
9

Peschl, Markus F. "Cognitive Modelling: Von der symbolischen AI zum ’connectionist approach’." In Informatik-Fachberichte. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-74688-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chevul, Stefan, Lennart Isaksson, Markus Fiedler, and Peter Lindberg. "Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network." In Wireless Systems and Network Architectures in Next Generation Internet. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11750673_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "VPN connections"

1

Karaymeh, Ashraf, Mohammad Ababneh, Malik Qasaimeh, and Mustafa Al-Fayoumi. "Enhancing Data Protection Provided by VPN Connections over Open WiFi Networks." In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS). IEEE, 2019. http://dx.doi.org/10.1109/ictcs.2019.8923104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nozomi Chishima, Saneyasu Yamaguchi, and Masato Oguchi. "Analysis of multiple target network storage access using multi-routing VPN connections." In 2007 2nd International Conference on Digital Information Management. IEEE, 2007. http://dx.doi.org/10.1109/icdim.2007.4444277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Yue, Xiangqing Tian, Lufeng Leng, Tong Ye, and Yikai Su. "Optical VPN Connecting ONUs in Different PONs." In OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference. IEEE, 2007. http://dx.doi.org/10.1109/ofc.2007.4348902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goodman, Malcolm A. "New Triaxial Connection Safety Factor for Tubular Design." In SPE/IADC International Drilling Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/204130-ms.

Full text
Abstract:
Abstract The API equation for internal leak of API connections is uniaxial since it ignores axial force and external backup pressure. ISO 13679 for qualification of premium connections is biaxial at best. It includes tension/compression but ignores backup pressure for both internal and external leak tests. For tubular design, this paper introduces a new fully triaxial safety factor for threaded connections with dependence on thread shear and hydrostatic pressure. Hydrostatic behavior is modelled with the Mean Normal Stress, and thread shear behavior is modelled with the shear component of the von Mises Stress. A Leak Line for use like the pipe body ellipse is proposed for quick leak assessment. Leak ratings are presented for an example case of 7-in. 35-ppf N80 LTC. The new triaxial safety factor with two connection constants applies to all types of threaded connections, including tubing, casing, and drill pipe, so long as the two constants are evaluated with appropriate but simple physical tests.
APA, Harvard, Vancouver, ISO, and other styles
5

Watkins, Matthew, and Mark Jakiela. "Fastener Pattern Optimization of an Eccentrically Loaded Multi-Fastener Connection." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28891.

Full text
Abstract:
This paper presents the use of a genetic algorithm in conjunction with geometric nonlinear finite element analysis to optimize the fastener pattern and lug location in an eccentrically loaded multi-fastener connection. No frictional resistance to shear was included in the model, as the connection transmitted shear loads into four dowel fasteners through bearing-type contact without fastener preload. With the goal of reducing the maximum von Mises stress in the connection to improve fatigue life, the location of the lug hole and four fastener holes were optimized to achieve 55% less maximum stress than a similar optimization using the traditional instantaneous center of rotation method. Since the maximum stress concentration was located at the edge of a fastener hole where fatigue cracks could be a concern, reduction of this quantity lowers the probability of crack growth for both bearing-type and slip-resistant connections. It was also found that the location of the maximum von Mises stress concentration jumped from the fastener region to the lug as the applied force angle was decreased below 45 degrees, thus the fastener pattern could not be optimized for lower angles.
APA, Harvard, Vancouver, ISO, and other styles
6

Basheer Al-Somaidai, Mohammed, and Omar Mowaffak Ahmad Alsaydia. "Remote monitoring and controlling of gas sensors using VPN connection." In 2012 International Conference on Future Communication Networks (ICFCN). IEEE, 2012. http://dx.doi.org/10.1109/icfcn.2012.6206879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lucey, Siobhán, Brendan McElroy, and Lauren McInally. "Teaching in the 21st century – Engaging students in active learning using student response systems." In Learning Connections 2019: Spaces, People, Practice. University College Cork||National Forum for the Enhancement of Teaching and Learning in Higher Education, 2019. http://dx.doi.org/10.33178/lc2019.05.

Full text
Abstract:
The prevalence of student response systems (hereafter SRS) in higher education has grown significantly in the last few years. Student classroom participation and student’s assessment of performance particularly in larger classes, has often been regarded as problematic in pedagogical research (Black and Wiliam, 1998; Fies and Marshall, 2006). Growth in technology, coupled with popularity of handheld devices has led to the development in SRS with the intention of increasing classroom participation and engaging students in the lecture setting (Denker, 2013). Studies identify benefits to students participating in the classroom using SRS including increased student involvement, attendance, learning and engagement (Heaslip et al., 2014; Van Daele et al., 2017). This research seeks to examine the effects of a SRS on student participation and engagement in large undergraduate economics modules at both an Irish and UK university during the academic year of 2018/19. We compare a control period (no SRS in place) with a trial period (SRS in place). The results show that the use of the SRS significantly increased student’s interaction with the lecturer and their ability to perform self-assessment in absolute terms and relative to their peers.
APA, Harvard, Vancouver, ISO, and other styles
8

Hata, Hiroaki. "A Bridging VPN for Connecting Wireless Sensor Networks to Data Centers." In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaklauskas, Liudvikas, and Dominykas Pugačius. "Secure remote client connection to higher education institution internal computer network through VPN." In Applied Scientific Research. Šiaulių valstybinė kolegija / Šiauliai State Higher Education Institution, Lithuania, 2023. http://dx.doi.org/10.56131/tmt.2023.2.1.111.

Full text
Abstract:
The article analyzes the problem of secure connection of a remote client to the internal computer network of the higher education institution. The most commonly used OpenVPN, Libreswan and WireGuard solutions were evaluated. The analysis of the literature showed that the OpenVPN solution is the most suitable for implementing a system for secure connection of remote clients to the internal computer network of the higher education institution. OpenVPN is easy to administer, able to read certificates and private keys from the most popular operating systems, uses two-way certificate authentication. Has been analyzed and assessed the needs of higher education institution users. The study of requirements for technical equipment was carried out. A conceptual model of the projected system has been prepared. A virtual model of the designed system was implemented and tested using cloud computing solutions. Checked the availability of internal network services. Evaluated encryption of transmitted data. Keywords: VPN, OpenVPN, WireGuard, Libreswan, IPSec
APA, Harvard, Vancouver, ISO, and other styles
10

Sakai, Tomoki, Shingo Yamakawa, Dai Hanawa, and Kimio Oguchi. "Low power consumption enterprise/campus network that realizes wavelength VPN with AWG loopback connection." In 2010 Photonics Global Conference. IEEE, 2010. http://dx.doi.org/10.1109/pgc.2010.5706042.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "VPN connections"

1

Wroblewski, Angela, Bente Knoll, Barbara Pichler, et al. Chancen feministischer Evaluation. Methodische Herausforderungen bei der Evaluation von Gender Mainstreaming und Gleichstellungspolitiken. Working Paper 119. Edited by Angela Wroblewski. IHS - Institute for Advanced Studies, 2018. http://dx.doi.org/10.22163/fteval.2018.502.

Full text
Abstract:
Studies in the context of gender mainstreaming, gender equality policy or feminist issues often face specific challenges in connection with the empirical approach. The Gender Mainstreaming Working Group (AK GM) of the German Evaluation Society (DeGEval) focused on the choice of adequate methods and research designs for the evaluation of gender mainstreaming measures, gender equality policies and feminist evaluation at its spring conference 2017, which took place at the IHS on 11 May 2017 and is documented in this volume.
APA, Harvard, Vancouver, ISO, and other styles
2

CAPACITY EVALUATION OF EIGHT BOLT EXTENDED ENDPLATE MOMENT CONNECTIONS SUBJECTED TO COLUMN REMOVAL SCENARIO. The Hong Kong Institute of Steel Construction, 2021. http://dx.doi.org/10.18057/ijasc.2021.17.3.6.

Full text
Abstract:
The extended stiffened endplate (8ES) connection is broadly used in the seismic load-resisting parts of steel structures. This connection is prequalified based on the AISC 358 standard, especially for seismic regions. To study this connection’s behaviors, in the event of accidental loss of a column, the finite element model results were verified against the available experimental data. A parametric study using the finite element method was then carried out to investigate these numerical models’ maximum capacity and effective parameters' effect on their maximum capacity in a column loss scenario. This parametric analysis demonstrated that these connections fail at the large displacement due to the catenary action mode at the rib stiffener's vicinity. The carrying capacity, PEEQ, Von-Mises stress, middle column force-displacement, critical bolt axial load, and the beam axial load curves were discussed. Finally, using the Least Square Method (LSM), a formula is presented to determine the displacement at the maximum capacity of these connections. This formula can be used in this study's presented method to determine the maximum load capacity of the 8ES connections in a column loss scenario.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!