Siga este enlace para ver otros tipos de publicaciones sobre el tema: Computer networks.

Artículos de revistas sobre el tema "Computer networks"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Computer networks".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Sireesha, Manchoori, and Gobi N. "Computer Networks." International Journal of Research Publication and Reviews 5, no. 3 (2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Texto completo
Resumen
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hyman, William A. "Medical Devices, Computers, and Computer Networks." Biomedical Safety & Standards 39, no. 1 (2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Gumen, O., I. Selina, and D. Міz. "NEURAL NETWORKS. COMPUTER VISUAL RECOGNITION." Modern problems of modeling, no. 26 (June 13, 2024): 95–99. https://doi.org/10.33842/2313125x-2024-26-95-99.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

GOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, no. 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bogucki, Peter. "Computer Networks." Anthropology News 27, no. 6 (1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Brinn, L. W. "Computer Networks." ACM SIGCSE Bulletin 17, no. 1 (1985): 135–39. http://dx.doi.org/10.1145/323275.323305.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jensen, Pamela S. "Computer Networks." Investigative Radiology 20, no. 6 (1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Mathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wellman, B. "Computer Networks As Social Networks." Science 293, no. 5537 (2001): 2031–34. http://dx.doi.org/10.1126/science.1065547.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Texto completo
Resumen
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, e
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Zizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.

Texto completo
Resumen
The information age has arrived, and the Internet has become an important part of life. Computers have become an important tool in daily work, study, entertainment, etc., changing our lives. However, in the process of widespread use of computers and networks, security issues have also become an important obstacle to their development. Problems such as computer viruses, confidential information leaks, and hacker intrusions have caused economic and property damage to computer users. This article mainly explains the basic contents of computer network security and virtual network technology, as we
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Sathyamurthy, N. "Let There be Computers and Virtual Computer Networks!" Resonance 25, no. 10 (2020): 1463–66. http://dx.doi.org/10.1007/s12045-020-1063-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Yanova, Olga Yu, Osman M. Minaev, and Hava S. Khalieva. "THE USE OF VIRTUAL NETWORK TECHNOLOGY IN ENSURING THE SECURITY OF COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 11/12, no. 152 (2024): 194–200. https://doi.org/10.36871/ek.up.p.r.2024.11.12.020.

Texto completo
Resumen
With the actual development of computer network security, virtual network tech-nology, as a public network security technology, can effectively overcome the limitations of phys-ical location and use a simulated network environment for users to perform data access or down-load operations. This application method can better protect information, data, and files from download links. The use of virtual network technology in ensuring the security of computer net-works can not only improve the efficiency of computers, but also significantly guarantee the security of computer networks and have certain
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Smith, E. "Review: Computer Networks." Computer Bulletin 46, no. 1 (2004): 30. http://dx.doi.org/10.1093/combul/46.1.30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Đokić, Ratomir Đ., and Milorad S. Markagić. "Computer networks forensics." Vojnotehnicki glasnik 61, no. 1 (2013): 136–45. http://dx.doi.org/10.5937/vojtehg61-1493.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Smythe, C. "Computer Communication Networks." Electronics & Communications Engineering Journal 4, no. 1 (1992): 31. http://dx.doi.org/10.1049/ecej:19920007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Max, G. "Modelling computer networks." Journal of Physics: Conference Series 268 (January 1, 2011): 012018. http://dx.doi.org/10.1088/1742-6596/268/1/012018.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Gorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Quarterman, John S., and Josiah C. Hoskins. "Notable computer networks." Communications of the ACM 29, no. 10 (1986): 932–71. http://dx.doi.org/10.1145/6617.6618.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Fluck, Andrew. "Using Computer Networks." British Journal of Special Education 16, no. 1 (2007): 14. http://dx.doi.org/10.1111/j.1467-8578.1989.tb01352.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Madaeva, Madina S., Salidat M. Yunaeva, and Irina V. Grigorieva. "THE ROLE OF COMPUTER INFORMATION NETWORKS IN ECONOMIC ACTIVITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 17–22. https://doi.org/10.36871/ek.up.p.r.2024.09.10.003.

Texto completo
Resumen
The development of computer and network technologies has led human society to enter the information age. In the society of the future, computers will make a number of changes to the structure of the economy, the direction of employment, international economic forms and trade. Based on the relationship between computer networks and the economy, this article analyzes the impact of computer networks on the economy and how computer networks can be used to promote greater economic development.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Murdalova, Iman E., Aiset U. Baydarova, and Deni M. Temirsultanov. "THE ROLE OF COMPUTER NETWORKS IN ECONOMIC DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/11, no. 153 (2024): 236–40. https://doi.org/10.36871/ek.up.p.r.2024.12.11.028.

Texto completo
Resumen
The development of computer and network technologies has brought human society into the information age. In the society of the future, computers will cause a number of changes in the economic structure, the direction of employment, the international economic form and the form of trade. This article begins with the relationship between computer networks and the economy, analyzes the impact of computer networks on the economy and ways to use com-puter networks to promote economic development.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Alviyanto, Fendi, Thomas Budiman, and Anton Zulkarnain Sianipar. "LAN Network Optimization to Support Practicum Activities Using Action Research Method at STMIK Jayakarta." Jurnal Indonesia Sosial Teknologi 5, no. 7 (2024): 3050–58. http://dx.doi.org/10.59141/jist.v5i7.1104.

Texto completo
Resumen
The importance of using computer networks in campus laboratories to improve the quality of education and research is also increasing. However, there are problems found in the use of computer networks in campus laboratories, namely low data transmission speeds, network insecurity and inaccessible resources. Therefore, this research was conducted to determine the factors that influence the performance of computer networks in campus laboratories, including data transmission speed. Computer networks evolved from point-to-point communication to computers connecting to each other and exchanging info
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Wu, Binbin, Jingyu Xu, Yifan Zhang, Bo Liu, Yulu Gong, and Jiaxin Huang. "Integration of computer networks and artificial neural networks for an AI-based network operator." Applied and Computational Engineering 64, no. 1 (2024): 122–27. http://dx.doi.org/10.54254/2755-2721/64/20241370.

Texto completo
Resumen
This paper proposes an integrated approach combining computer networks and artificial neural networks to construct an intelligent network operator, functioning as an AI model. State information from computer networks is transformed into embedded vectors, enabling the operator to efficiently recognize different pieces of information and accurately output appropriate operations for the computer network at each step. The operator has undergone comprehensive testing, achieving a 100% accuracy rate, thus eliminating operational risks. Additionally, a simple computer network simulator is created and
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Giniyatova, Dinara Halilovna, and Vasilii Aleksandrovich Lapinskii. "Nodules detection on computer tomograms using neural networks." Program Systems: Theory and Applications 13, no. 3 (2022): 81–98. http://dx.doi.org/10.25209/2079-3316-2022-13-3-81-98.

Texto completo
Resumen
Results of neural networks (NN) application to the problem of detecting neoplasms on computer tomograms of the lungs with limited amount of data are presented. Much attention is paid to the analysis and preprocessing of images as a factor improving the NN quality. The problem of NN overfitting and ways to solve it are considered. Results of the presented experiments allow drawing a conclusion about the efficiency of applying individual NN architectures in combination with data preprocessing methods to detection problems even in cases of a limited training set and a small size of detected objec
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Brar, Gurbinder Singh, and Rahul Malhotra. "Wireless Computer Networks and Associated Energy Efficient Protocols." SIJ Transactions on Computer Networks & Communication Engineering 01, no. 05 (2013): 06–09. http://dx.doi.org/10.9756/sijcnce/v1i5/0105370201.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Madaeva, Madina S., Salidat M. Yunaeva, and Svetlana G. Nikolaeva. "THE IMPACT OF INFORMATION COMPUTER NETWORKS ON SOCIAL DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 86–92. https://doi.org/10.36871/ek.up.p.r.2024.09.10.012.

Texto completo
Resumen
currently, human society has entered the era of the Internet. Computers and the Internet are already closely linked to the daily work, education, and lives of ordinary people. Human society is currently going through a period of historical leaps. It is moving from the era of high industrialization to the previous era of computer networks. With the rapid development of computer technology and network communication technologies, computers and networks are penetrating all corners of human society at an alarming rate. So, what approaches and methods will we use in the future to counter the materia
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Mijwel, Maad M., Adam Esen, and Aysar Shamil. "Overview of Neural Networks." Babylonian Journal of Machine Learning 2023 (August 11, 2023): 42–45. http://dx.doi.org/10.58496/bjml/2023/008.

Texto completo
Resumen
Since it was confirmed and verified that the human nervous system consists of individual cells, which were later called neurons, and it was discovered that these cells connect with each other to form an extensive communication network, a large number of possibilities have been opened for application in multiple disciplines in areas of knowledge. Neural Networks are created to perform tasks such as pattern recognition, classification, regression, and many other functions that serve humans and are an essential component in the field of machine learning and artificial intelligence. In computer sc
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Texto completo
Resumen
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Texto completo
Resumen
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Adamek, Milan, Miroslav Matysek, and Michaela Barinova. "Computer networks in education." MATEC Web of Conferences 125 (2017): 02058. http://dx.doi.org/10.1051/matecconf/201712502058.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Marshall, E. "Worm Invades Computer Networks." Science 242, no. 4880 (1988): 855–56. http://dx.doi.org/10.1126/science.242.4880.855.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Moore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Anderson, P. C. "Evaluating the computer networks." Academic Medicine 62, no. 4 (1987): 356. http://dx.doi.org/10.1097/00001888-198704000-00011.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Jevtovic, Milojko. "Protection of computer networks." Vojnotehnicki glasnik, no. 5 (2005): 430–41. http://dx.doi.org/10.5937/vojtehg0505430j.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Shenker, S., D. Clark, D. Estrin, and S. Herzog. "Pricing in computer networks." ACM SIGCOMM Computer Communication Review 26, no. 2 (1996): 19–43. http://dx.doi.org/10.1145/231699.231703.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Mckendrick, David, Andrew Farmer, JonathanD S. Kay, Paul Hodgkinson, and Norman Westwood. "COMPUTER NETWORKS IN MEDICINE." Lancet 334, no. 8677 (1989): 1456. http://dx.doi.org/10.1016/s0140-6736(89)92065-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Shamim, A. A. "Local Area Computer Networks." IETE Technical Review 3, no. 10 (1986): 533–43. http://dx.doi.org/10.1080/02564602.1986.11438019.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Jenkins, Sarah. "Computer Networks: Publisher's Note." Computer Networks 160 (September 2019): iii. http://dx.doi.org/10.1016/s1389-1286(19)30902-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Wood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Zufarov, Zair Makhmudovich. "TOPOLOGY OF COMPUTER NETWORKS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 1, no. 1 (2021): 886–91. https://doi.org/10.5281/zenodo.4742124.

Texto completo
Resumen
<em>The article provides information on computer network topologies. The topology of computer networks provides information on their application, as well as the types of network topologies and their use, as well as their advantages and disadvantages.</em>
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Ren, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Texto completo
Resumen
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we ai
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Prijs, Jasper, Zhibin Liao, Soheil Ashkani-Esfahani, et al. "Artificial intelligence and computer vision in orthopaedic trauma." Bone & Joint Journal 104-B, no. 8 (2022): 911–14. http://dx.doi.org/10.1302/0301-620x.104b8.bjj-2022-0119.r1.

Texto completo
Resumen
Artificial intelligence (AI) is, in essence, the concept of ‘computer thinking’, encompassing methods that train computers to perform and learn from executing certain tasks, called machine learning, and methods to build intricate computer models that both learn and adapt, called complex neural networks. Computer vision is a function of AI by which machine learning and complex neural networks can be applied to enable computers to capture, analyze, and interpret information from clinical images and visual inputs. This annotation summarizes key considerations and future perspectives concerning co
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Texto completo
Resumen
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Rao, Jai R. "Reading up books: Computer communications networks: New technologies revolutionize computers." IEEE Potentials 4, no. 4 (1985): 33–36. http://dx.doi.org/10.1109/mp.1985.6500211.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Texto completo
Resumen
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical ba
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

BENGA, Daniel-Mihai ,., and Marian ALEXANDRU. "REAL-EMULATED-SIMULATED INTEGRATED ENVIRONMENT FOR TESTING COMPUTER NETWORKS." Review of the Air Force Academy 16, no. 1 (2018): 39–44. http://dx.doi.org/10.19062/1842-9238.2018.16.1.6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Staneva, Elisaveta, and Mariyan Rachev. "Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135–40. http://dx.doi.org/10.11610/isij.4709.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Pierre, S., H. Said, and W. G. Probst. "Routing in computer networks using artificial neural networks." Artificial Intelligence in Engineering 14, no. 4 (2000): 295–305. http://dx.doi.org/10.1016/s0954-1810(00)00014-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!