computer-network IEEE PAPER 2017
System Trespasser Behavior after Exposure to Warning Messages at a ChineseComputer Network : An Examination.
free download
Abstract System trespassing, which refers to the unauthorized access ofcomputersystems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered Investigations of data flow in acomputer networkare essential for planning the system expansion, as well as for solving problems. The main difficulty in managing acomputer network is to analyze results available from traffic monitoring, since data are not intuitive, and
To appear in: Journal ofNetworkandComputerApplications
free download
Abstract The variety and complexity in cloud marketplaces is growing, making it difficult for cloud consumers to choose cloud services from multiple providers in an economic and suitable way by taking into account multiple objectives and constraints. In this paper, we
To appear in: Journal ofNetworkandComputerApplications
free download
Abstract The Internet of Things (IoT) is enabling innovative applications in various domains. Due to its heterogeneous and wide-scale structure, it introduces many new security issues. To address this problem, we propose a framework for modeling and assessing the security
Convolutional NeuralNetworkfor Functional Near-Infrared Spectroscopy in Brain- ComputerInterface
free download
Abstract Functional near-infrared spectroscopy (fNIRS) is an emerging neuroimaging modality which can be utilized in braincomputer interface (BCI). In order to interpret the signal, important features for classification are extracted from hemodynamic signal. In the
To appear in: Journal ofNetworkandComputerApplications
free download
Abstract A major challenge in designing Internet of Things (IoT) systems is to meet various non-functional requirements such as lifetime, reliability, throughput, delay, and so forth. Furthermore, IoT systems tend to have competing requirements, which exacerbate these
Incorporation of Human Resistant System and AdvanceNetworkSecurity System to improveComputerSecurity
free download
Abstract-Numerous of the present security systems do not provide satisfactory level of protection aligned with everincreasing threats. The main reason for their collapse is the use of point solutions to protect hosts and reactive approach against intrusions. Here we studied
To appear in: Journal ofNetworkandComputerApplications
free download
Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical objects belonging to different domains such as home automation, industrial process, human health and environmental monitoring. It deepens the presence of Internetconnected devices
CHINESE FONT STYLE TRANSFER WITH NEURALNETWORKDARTMOUTHCOMPUTERSCIENCE TECHNICAL REPORT TR2017-830 A Thesis Submitted
free download
Abstract Font design is an important area in digital art. However, designers have to design character one by one manually. At the same time, Chinese contains more than 20,000 characters. Chinese offical dataset GB 18030-2000 has 27,533 characters. ZhongHuaZi-
Design and Deployment of Hands-onNetworkLab Experiments forComputerScience Engineers
free download
Computernetworks is an essential area in the training ofcomputerscience engineers. Delivery of networking laboratory experiments with specialized equipment is a challenge for computernetworks teachers. The high cost of networking equipment makes it necessary to
A Complete Bibliography of Publications in the Journal ofNetworkandComputerApplications
free download
Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USAE-mail: beebe@math.utah.edu, beebe@acm.org, beebe@ computer .org (Internet) WWW URL: http://www.math.utah.edu/~beebe
e-Epidemic Model for the Analysis of Impact of Worms inComputer Network
free download
Abstract-With regard to curb the impact and transmission of worms for general form of incidence rate incomputernetworks, SIQRS (susceptible infectious quarantine recovered susceptible) model has been developed. Basic reproduction number, endemic equilibrium
INTRUSION DETECTION SYSTEM ON ACOMPUTER NETWORKUSING AN ENSEMBLE OF RANDOMIZABLE FILTERED CLASSIFIER, K-NEAREST
free download
Abstract: Intrusion detection is the process of monitor the event occurring in acomputer networkand analyzing them for signs of intrusions. In recent years, the needs of internet are felt in lives of many people. Accordingly, many studies have been done on security in virtual
Research and application of inclusive practical teaching forComputer NetworkCourse Designing
free download
AbstractComputer NetworkTechnology is a corecomputercourse with theory and practice combination. This paper puts forward the reform of the practical teaching reform in the course of the design ofcomputer networkcourse design ofcomputerundergraduate. The
An Ensemble Data Mining Approach for Intrusion Detection in aComputer Network
free download
Abstract-As activities being done on the internet keep expanding every day due to the fact that we are in the era of the information age, securing sensitive and crucial data oncomputer networks against malicious attacks tends to be a challenging issue. Designing effective
e-SEIR EPIDEMIC MODEL FOR SPREAD OF MALICIOUS OBJECTS INCOMPUTER NETWORK .
free download
Abstract : We developed an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic model for the transmission of malicious objects incomputer network . Basic reproduction number , Equilibrium, and Locally stability are found. Numerical methods are employed to solve and
Computer NetworkPerformance management using a SimpleNetworkManagementProtocol
free download
Abstract Performance management is understanding the behavior ofnetworkand its elements in response to traffic demands, measuring and reporting onnetworkperformance so that performance can be maintained at an acceptable level no real-time or near real-time
A Cloud-Based Model forComputer NetworkThreats Management.
free download
ABSTRACT In this paper, a cloud model was developed to manage threats beyond users networks capability. This is with a view to addressing threat database growth which degrades users networks performance as a result of constant threat update, and lack of
A Study ofComputerApplication in Resource Management and Developing a ModelNetworkAdoption in Construction Projects
free download
Abstract: Construction is one of the area in whichcomputerapplication software are highly required to perform different task at various stages of project construction. Computers have been used to enhance the effectiveness of construction management. The difficulty about
Project-based Learning inComputerScience Education with SocialNetworkApplication Programming Interfaces
free download
Abstract-More and more colleges and universities today are adopting social networks to recruit, engage and retain students. For college admission personnel, it is hard to find any easier way to find high school students and graduates. Other efforts have also been made
TEACHINGCOMPUTERTO PLAY GAMES USING ARTIFICIAL NEURALNETWORKAND GENETIC ALGORITHM
free download
Abstract: This project explores the application of several machine learning techniques such as Artificial Neural Networks, Genetic Algorithm (GA), Neuro-Evolution and Neuro-Evolution of Augmenting Topologies (NEAT) to develop an agent capable of successfully playing
Advancedcomputertechnologies and their benefits for Bayesiannetworklearning
free download
Abstract: Probabilistic graphical models are an attractive approach used for modelling complex systems, as the nature of thenetworkallows uncertainty in the system to be accounted for. In particular, Bayesian networks, and their temporal extension, Dynamic The constantly increasing trend of cyber-attacks and global terrorism makes it vital for any organization to protect and secure itsnetworkand computing infrastructure. With the continuous progress the Internet is facing, companies need to keep up by creating and
TheNetworkCommunity as Instrumental Environment for Supporting the Training Process of Teachers ofComputerScience
free download
Abstract This article is devoted to the ways of teaching ofComputerScience of students of pedagogical education innetworkcommunity. The author considers educational possibilities ofnetworkcommunity, pedagogical features of teaching ofComputerScience
AComputerBased Artificial NeuralNetworkController with Interactive Auditory Guidance
free download
The proposed design offers a complete online and offline solution to manage the industrial systems. The designed hardware able to, read analog signals, digital signals, and
Data Loss Control In A CongestedNetworkUsingComputerBased Forecasting Techniques
free download
Abstract: The phenomenon of packet loss in a congestednetworkif not controlled can lead to a devastating experience. It can crumble a business, cause a company to fold or render someone bankrupt. This research work examines the use of acomputerbased forecasting CSE PROJECTS