Literatura académica sobre el tema "Internet (computer network)"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Internet (computer network)".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Internet (computer network)"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Texto completo
Resumen
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Texto completo
Resumen
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each compu
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Texto completo
Resumen
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer netwo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Texto completo
Resumen
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Texto completo
Resumen
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

M.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Texto completo
Resumen
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 m
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Texto completo
Resumen
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the int
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Texto completo
Resumen
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase u
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Texto completo
Resumen
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Zulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.

Texto completo
Resumen
A computer network system is defined as a collection of several independent computers connected to each other. This connection allows these computers to share information and programs with each other (Putuasduki, 2021). SOHO stands for Small Office, Home Office. SOHO is a hybrid apartment between residential and commercial space, where people can work and live in the same building. SOHO apartments are typically loft style, meaning they have high ceilings. High ceilings lend themselves well to building a mezzanine, an elevated area accessible by stairs that can be used as a bedroom or desk. (Ar
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Internet (computer network)"

1

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Texto completo
Resumen
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access P
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Pezaros, D. "Network traffic measurement for the next generation Internet." Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.

Texto completo
Resumen
Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differenti
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Yang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Texto completo
Resumen
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Zaichen, and 張在琛. "Network-supported internet multicast congestion and error control." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Texto completo
Resumen
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Internet (computer network)"

1

Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hare, Chris. Internet firewallsand network security. 2nd ed. Indianapolis, Ind: New Riders Publishing, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Danny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Indianapolis, Ind: Cisco, 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Miller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

"Internet yong hu ci dian" bian yi zu., ed. Internet yung hu ci dian =: Internet user's dictionary. Guangzhou: Ji nan da xue chu ban she, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Maloff, Joel. Mecklermedia's official Internet World net.profit: Expanding your business using the Internet. London: Internet World, 1995.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hare, Chris. Internet firewalls and network security. 2nd ed. Indianapolis, Ind: New Riders Pub., 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hansgeorg, Schmidt-Bergmann, Liesegang Torsten, and Museum für Literatur am Oberrhein., eds. Liter@tur: Computer-Literatur-Internet. Bielefeld: Aisthesis, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

William, Stallings. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

William, Stallings. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Internet (computer network)"

1

Howser, Gerry. "The Network Layer." In Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Howser, Gerry. "The Laboratory Network." In Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Wei, Zhao, Yanli Lv, Chunhe Xia, Yang Luo, and Qing Wei. "A Computer Network Defense Policy Refinement Method." In Frontiers in Internet Technologies, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53959-6_12.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ahmad, Muhammad Aminu, and Steve Woodhead. "Containment of Fast Scanning Computer Network Worms." In Internet and Distributed Computing Systems, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23237-9_21.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Howser, Gerry. "Shortest Path Through the Network." In Computer Networks and the Internet, 205–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_13.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Goertzel, Ben. "The Network is the Computer is the Mind (is the World)." In Creating Internet Intelligence, 97–113. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0561-7_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Cao, Huan, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, and Chunping Zhao. "Analysis on the Security of Satellite Internet." In Communications in Computer and Information Science, 193–205. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_14.

Texto completo
Resumen
AbstractSatellite Internet (SI) is a new way to provide internet access all over the world. It will bring great convenience to international communication. Compared with the traditional communication networks, SI has a significant change in network architecture and communication model, which will have an important impact on national information network security. For example, the global interconnected SI consists of a large number of small satellites and each satellite has multi-beams to cover a vast area, which leads to the disorderly flow of information across the border, and greatly increases the difficulty of network protection. Therefore, it is necessary to closely track the development of SI and analyze security problems brought by SI. In this paper, we analyze the security risks of SI from the perspective of national security, network security and equipment security, and thirteen security issues have been summarized to provide reference for the healthy development of SI industry.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kizza, Joseph Migga. "Internet of Things (IoT): Growth, Challenges, and Security." In Guide to Computer Network Security, 517–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_24.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Warren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Maillé, Patrick, Peter Reichl, and Bruno Tuffin. "Internet Governance and Economics of Network Neutrality." In Lecture Notes in Computer Science, 108–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30382-1_15.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Internet (computer network)"

1

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Garsva, Eimantas, Nerijus Paulauskas, Gediminas Grazulevicius, and Lech Gulbinovic. "Academic computer network traffic statistical analysis." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217987.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zhou, Yun-xia, Yue-long Zhao, and Xi Yang. "The Computer Network with Intelligent Disks." In 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566576.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Zhang, Zehao, Lin Peng, He Wang, Jin Sun, Tao Chang, and Ling Zhuo. "A wearable computer wireless sensor network." In 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2017. http://dx.doi.org/10.1109/ei2.2017.8245389.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kotenko, Igor, and Alexander Ulanov. "Antagonistic Agents in the Internet: Computer Network Warfare Simulation." In 2006 9th International Conference on Information Fusion. IEEE, 2006. http://dx.doi.org/10.1109/icif.2006.301705.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Xianglong, Liu, Lou Yihua, Liang Yuan, and Shan Baosong. "Predicting Internet Network Distance Using ISOMAP." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.245.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Matray, Peter, Peter Haga, Sandor Laki, Istvan Csabai, and Gabor Vattay. "On the network geography of the Internet." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5934909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Xiong, Sha. "The Application of “Internet+” Artificial Intelligence in Computer Network Technology." In 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI). IEEE, 2023. http://dx.doi.org/10.1109/icdacai59742.2023.00068.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Liu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Internet (computer network)"

1

Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

VEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, November 2023. http://dx.doi.org/10.12731/er0743.18112023.

Texto completo
Resumen
The computer game "The Way to a secure Internet" was created by teachers of the MDOU "D/ s № 73" of Magnitogorsk on the cross-platform environment for the development of Unity computer programs. The game is aimed at older preschool children. It is aimed at the formation of life skills of students in the information society in order to ensure the information security of children. The main educational material is the selection of rules for safe behavior when using the Internet information network by students, taking into account the peculiarities of children's perception of information. The plot
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Nechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Texto completo
Resumen
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Merced
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Sokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0785.29012024.

Texto completo
Resumen
The e-learning course "Informatics" is compiled in accordance with the requirements of the Federal State Educational Standard of Higher Education in the specialty 33.05.01 Pharmacy (specialty level), approved by Order of the Ministry of Education and Science of the Russian Federation dated August 11, 2016 No. 1037, and taking into account the requirements of the professional standard 02.006 "Pharmacist", approved by order of the Ministry of Labor and Social Protection No. 91n of the Russian Federation dated March 9, 2016. The purpose of the course is to master the necessary amount of theoretic
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Texto completo
Resumen
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bragdon, Sophia, Vuong Truong, and Jay Clausen. Environmentally informed buried object recognition. Engineer Research and Development Center (U.S.), November 2022. http://dx.doi.org/10.21079/11681/45902.

Texto completo
Resumen
The ability to detect and classify buried objects using thermal infrared imaging is affected by the environmental conditions at the time of imaging, which leads to an inconsistent probability of detection. For example, periods of dense overcast or recent precipitation events result in the suppression of the soil temperature difference between the buried object and soil, thus preventing detection. This work introduces an environmentally informed framework to reduce the false alarm rate in the classification of regions of interest (ROIs) in thermal IR images containing buried objects. Using a da
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Modlo, Yevhenii O., Serhiy O. Semerikov, Ruslan P. Shajda, Stanislav T. Tolmachev, and Oksana M. Markova. Methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3878.

Texto completo
Resumen
The article describes the components of methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects: using various methods of representing models; solving professional problems using ICT; competence in electric machines and critical thinking. On the content of learning academic disciplines “Higher mathematics”, “Automatic control theory”, “Modeling of electromechanical systems”, “Electrical machines” features of use are disclosed for Scilab, SageCell, Google Sheets, Xcos on Cloud in
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Patel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41042.

Texto completo
Resumen
Bio-structures owe their remarkable mechanical properties to their hierarchical geometrical arrangement as well as heterogeneous material properties. This dissertation presents an integrated, interdisciplinary approach that employs computational mechanics combined with flow network analysis to gain fundamental insights into the failure mechanisms of high performance, light-weight, structured composites by examining the stress flow patterns formed in the nascent stages of loading for the rostrum of the paddlefish. The data required for the flow network analysis was generated from the finite ele
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Varina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.

Texto completo
Resumen
Technologies based on cloud computing is one of the demanded and actively developing areas of the modern information world. Cloud computing refers to an innovative technology that allows you to combine IT resources of various hardware platforms into a single whole and provide the user with access to them via a local network or the global Internet. Cloud services from various providers offer users access to their resources via the Internet via free or shareware cloud applications, the hardware and software requirements of which do not imply that the user has high-performance and resource-consum
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Goncharenko, Tatiana, Nataliia Yermakova-Cherchenko, and Yelyzaveta Anedchenko. Experience in the Use of Mobile Technologies as a Physics Learning Method. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4468.

Texto completo
Resumen
Swift changes in society, related to sciences technicians’ development, technologies, by the increase of general volume of information, pull out new requirements for maintenance, structure, and quality of education. It requires teachers to diversify a tool in the direction of the increase in possibilities of the use of mobile technologies and computer systems. Lately in the world, more attention spared to the use of mobile learning, which in obedience to «Recommendations of UNESCO on the questions of a policy in the area of mobile learning» foresees the use of mobile technology, both separate
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!