computer-network IEEE PAPER 2017





System Trespasser Behavior after Exposure to Warning Messages at a ChineseComputer Network : An Examination.
free download

Abstract System trespassing, which refers to the unauthorized access ofcomputersystems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered Investigations of data flow in acomputer networkare essential for planning the system expansion, as well as for solving problems. The main difficulty in managing acomputer network is to analyze results available from traffic monitoring, since data are not intuitive, and

To appear in: Journal ofNetworkandComputerApplications
free download

Abstract The variety and complexity in cloud marketplaces is growing, making it difficult for cloud consumers to choose cloud services from multiple providers in an economic and suitable way by taking into account multiple objectives and constraints. In this paper, we

To appear in: Journal ofNetworkandComputerApplications
free download

Abstract The Internet of Things (IoT) is enabling innovative applications in various domains. Due to its heterogeneous and wide-scale structure, it introduces many new security issues. To address this problem, we propose a framework for modeling and assessing the security

Convolutional NeuralNetworkfor Functional Near-Infrared Spectroscopy in Brain- ComputerInterface
free download

Abstract Functional near-infrared spectroscopy (fNIRS) is an emerging neuroimaging modality which can be utilized in braincomputer interface (BCI). In order to interpret the signal, important features for classification are extracted from hemodynamic signal. In the

To appear in: Journal ofNetworkandComputerApplications
free download

Abstract A major challenge in designing Internet of Things (IoT) systems is to meet various non-functional requirements such as lifetime, reliability, throughput, delay, and so forth. Furthermore, IoT systems tend to have competing requirements, which exacerbate these

Incorporation of Human Resistant System and AdvanceNetworkSecurity System to improveComputerSecurity
free download

Abstract-Numerous of the present security systems do not provide satisfactory level of protection aligned with everincreasing threats. The main reason for their collapse is the use of point solutions to protect hosts and reactive approach against intrusions. Here we studied

To appear in: Journal ofNetworkandComputerApplications
free download

Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical objects belonging to different domains such as home automation, industrial process, human health and environmental monitoring. It deepens the presence of Internetconnected devices

CHINESE FONT STYLE TRANSFER WITH NEURALNETWORKDARTMOUTHCOMPUTERSCIENCE TECHNICAL REPORT TR2017-830 A Thesis Submitted
free download

Abstract Font design is an important area in digital art. However, designers have to design character one by one manually. At the same time, Chinese contains more than 20,000 characters. Chinese offical dataset GB 18030-2000 has 27,533 characters. ZhongHuaZi-

Design and Deployment of Hands-onNetworkLab Experiments forComputerScience Engineers
free download

Computernetworks is an essential area in the training ofcomputerscience engineers. Delivery of networking laboratory experiments with specialized equipment is a challenge for computernetworks teachers. The high cost of networking equipment makes it necessary to

A Complete Bibliography of Publications in the Journal ofNetworkandComputerApplications
free download

Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USAE-mail: beebe@math.utah.edu, beebe@acm.org, beebe@ computer .org (Internet) WWW URL: http://www.math.utah.edu/~beebe

e-Epidemic Model for the Analysis of Impact of Worms inComputer Network
free download

Abstract-With regard to curb the impact and transmission of worms for general form of incidence rate incomputernetworks, SIQRS (susceptible infectious quarantine recovered susceptible) model has been developed. Basic reproduction number, endemic equilibrium

INTRUSION DETECTION SYSTEM ON ACOMPUTER NETWORKUSING AN ENSEMBLE OF RANDOMIZABLE FILTERED CLASSIFIER, K-NEAREST
free download

Abstract: Intrusion detection is the process of monitor the event occurring in acomputer networkand analyzing them for signs of intrusions. In recent years, the needs of internet are felt in lives of many people. Accordingly, many studies have been done on security in virtual

Research and application of inclusive practical teaching forComputer NetworkCourse Designing
free download

AbstractComputer NetworkTechnology is a corecomputercourse with theory and practice combination. This paper puts forward the reform of the practical teaching reform in the course of the design ofcomputer networkcourse design ofcomputerundergraduate. The

An Ensemble Data Mining Approach for Intrusion Detection in aComputer Network
free download

Abstract-As activities being done on the internet keep expanding every day due to the fact that we are in the era of the information age, securing sensitive and crucial data oncomputer networks against malicious attacks tends to be a challenging issue. Designing effective

e-SEIR EPIDEMIC MODEL FOR SPREAD OF MALICIOUS OBJECTS INCOMPUTER NETWORK .
free download

Abstract : We developed an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic model for the transmission of malicious objects incomputer network . Basic reproduction number , Equilibrium, and Locally stability are found. Numerical methods are employed to solve and

Computer NetworkPerformance management using a SimpleNetworkManagementProtocol
free download

Abstract Performance management is understanding the behavior ofnetworkand its elements in response to traffic demands, measuring and reporting onnetworkperformance so that performance can be maintained at an acceptable level no real-time or near real-time

A Cloud-Based Model forComputer NetworkThreats Management.
free download

ABSTRACT In this paper, a cloud model was developed to manage threats beyond users networks capability. This is with a view to addressing threat database growth which degrades users networks performance as a result of constant threat update, and lack of

A Study ofComputerApplication in Resource Management and Developing a ModelNetworkAdoption in Construction Projects
free download

Abstract: Construction is one of the area in whichcomputerapplication software are highly required to perform different task at various stages of project construction. Computers have been used to enhance the effectiveness of construction management. The difficulty about

Project-based Learning inComputerScience Education with SocialNetworkApplication Programming Interfaces
free download

Abstract-More and more colleges and universities today are adopting social networks to recruit, engage and retain students. For college admission personnel, it is hard to find any easier way to find high school students and graduates. Other efforts have also been made

TEACHINGCOMPUTERTO PLAY GAMES USING ARTIFICIAL NEURALNETWORKAND GENETIC ALGORITHM
free download

Abstract: This project explores the application of several machine learning techniques such as Artificial Neural Networks, Genetic Algorithm (GA), Neuro-Evolution and Neuro-Evolution of Augmenting Topologies (NEAT) to develop an agent capable of successfully playing

Advancedcomputertechnologies and their benefits for Bayesiannetworklearning
free download

Abstract: Probabilistic graphical models are an attractive approach used for modelling complex systems, as the nature of thenetworkallows uncertainty in the system to be accounted for. In particular, Bayesian networks, and their temporal extension, Dynamic The constantly increasing trend of cyber-attacks and global terrorism makes it vital for any organization to protect and secure itsnetworkand computing infrastructure. With the continuous progress the Internet is facing, companies need to keep up by creating and

TheNetworkCommunity as Instrumental Environment for Supporting the Training Process of Teachers ofComputerScience
free download

Abstract This article is devoted to the ways of teaching ofComputerScience of students of pedagogical education innetworkcommunity. The author considers educational possibilities ofnetworkcommunity, pedagogical features of teaching ofComputerScience

AComputerBased Artificial NeuralNetworkController with Interactive Auditory Guidance
free download

The proposed design offers a complete online and offline solution to manage the industrial systems. The designed hardware able to, read analog signals, digital signals, and

Data Loss Control In A CongestedNetworkUsingComputerBased Forecasting Techniques
free download

Abstract: The phenomenon of packet loss in a congestednetworkif not controlled can lead to a devastating experience. It can crumble a business, cause a company to fold or render someone bankrupt. This research work examines the use of acomputerbased forecasting CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER