Search

Your search keyword '"NETWORK computers"' showing total 1,407 results

Search Constraints

Start Over You searched for: Descriptor "NETWORK computers" Remove constraint Descriptor: "NETWORK computers"
1,407 results on '"NETWORK computers"'

Search Results

1. An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152.

2. A real time homogeneous wireless sensor network functioning using semi-tier clustering protocol for energy efficiency routing.

3. Cyclic edge and cyclic vertex connectivity of [formula omitted]-fullerene graphs.

4. Projection measure-driven optimization of q-rung orthopair fuzzy MAGDM for computer network security evaluation.

5. Lightweight HRNet: A Ligtweight Network for Bottom-Up Human Pose Estimation.

6. Real-Time Remote Monitoring and Overheating Early Warning of Thermodynamic State of Complex Equipment Systems Based on Computer Network Technology.

7. Optimal Control of SLBRS with Recovery Rates.

8. Exploring the Ethereum blockchain towards future schemes.

9. Botnet detection in internet of things (IOT) by swarm intelligence (SI) algorithm.

10. WiMax Network Design and Simulation for Middle Technical University Campus Using OPNET Modeler.

11. Analysis and implementation of computer network graph based on iterative control algorithm theory.

12. Improving computer network security evaluation with grey relational analysis and probabilistic simplified neutrosophic sets.

13. EXPLORING THE ADVANTAGES AND OBSTACLES OF MOBILE GOVERNANCE IN KASHMIR A COMPREHENSIVE STUDY.

14. Design and simulation an optimal enhanced PI controller for congestion avoidance in TCP/AQM system.

15. A modified technique of workload distribution in the fog-computing environment.

16. A Comparative Study of Fuzzy Domination and Fuzzy Coloring in an Optimal Approach.

17. Model for the Propagation of Malicious Objects in a Computer Network with Variable Infection Intensity.

18. Rt-swinir: an improved digital wallchart image super-resolution with attention-based learned text loss.

19. DRMT: A Decentralized IoT Device Recognition and Management Technology in Smart Cities.

20. Review on Channel Estimation for Reconfigurable Intelligent Surface Assisted Wireless Communication System.

21. A random access channel resources allocation approach to control machine‐to‐machine communication congestion over LTE‐advanced networks.

22. A Unified Approach for Extremal General Exponential Multiplicative Zagreb Indices.

23. Policy enforcement in traditional non-SDN networks.

24. Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information.

25. Image encryption using elliptic curve Diffie-Hellman method and discrete wavelet transform.

26. Comparison of server technologies using Kernel-based virtual machine and container virtualization.

27. Implementation of ACME-based automated centralized certificate management system.

28. Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network.

29. Detection of Malicious Network Activity by Artificial Neural Network.

30. The first propaganda war through computer networks: STEM academia and the breakup of Yugoslavia.

31. Computer Network Redundancy Reduction Using Video Compression.

32. Effect of Li–Si composites on electrochemical properties of silicon-based anode materials.

33. Machine Learning for Computer Systems and Networking: A Survey.

34. Cryptocurrency is accounting coordination: Selfish mining and double spending in a simple mining game.

35. Solving the multicommodity flow problem using an evolutionary routing algorithm in a computer network environment.

36. Application of Wireless Sensor Network Computer Technology in Financial Management System.

37. Group intrusion detection in the Internet of Things using a hybrid recurrent neural network.

38. Implementation model of network security for Royal Malaysian Navy network.

39. The implementation of competition to promote team working and thinking skills in computer network course.

40. Location dominating sets in friendship graphs.

41. A New Code Based Signature Scheme for Blockchain Technology.

42. Certificateless network coding scheme from certificateless public auditing protocol.

43. A comprehensive survey on human pose estimation approaches.

44. The Resilience of the Phonological Network May Have Implications for Developmental and Acquired Disorders.

45. Real-time measurement and control system based on automation technology under the background of network environment.

46. On the role of feedback in image recognition under noise and adversarial attacks: A predictive coding perspective.

47. "Tunable Light Source by Electric-field Control" Technology for High-quality, Low-latency Communications.

48. Leafy spanning arborescences in DAGs.

49. Semantic image segmentation algorithm in a deep learning computer network.

50. Multi server queuing system with crashes and alternative repair strategies.

Catalog

Books, media, physical & digital resources