computer network research paper 32
Modelling computer network security
free download
O Leulescu, T Petrescu, N Militaru ,agir.ro
Cuvinte cheie. Retea de calculatoare, informatii, securitate, model, protectia datelor.
Abstract. Securitatea retelelor este un serviciu important oferit pentru protectia datelor si
confidentialitatea informatiilor. Folosirea unui model de sceuritate adecvat este importanta
Abstract E-learning has the power to transform the way we learn, and to bring high quality,
accessible learning to everyone-so that every learner can achieve his or her full potential.
One form of elearning that piques learners’ as well as developers’ interest is educational
Self-similarity and computer network traffic
free download
M Taqqu ,statwww.epfl.ch
Ethernet local area network traffic appears to be approximately statistically self-similar. This
discovery, made about eight years ago, has had a profound impact on the field. I will try to
explain what statistical self-similarity means, how it is detected and indicate how one can
MASSACHUSETTS STATE COLLEGE COMPUTER NETWORK
free download
L Roomets ,Universityystems Exchange ,ERIC
The Massachusetts State College Computer Network was established in October of 1973 to
provide a computing and data proceSsing resource for the eleven state colleges of
Massachusetts. The network itself consists of a Control Data Cyber 72 computer lc3cated
USING WAVELENGTH ROUTING IN THE OPTICAL INTERCONNECTION COMPUTER NETWORK
free download
T Jinoong, Z Ge, ZI Nan, J Wencai ,Transactions of , 2000 ,xbywb.tjujournals.com
Abstract: The wavelength routing technology applied to computer interconnection networks
is introduced in this paper. By analyzing the relation between wavelength and network
routing, we describe a concept of wavelength used as network IP address, and propose a
APPLICATION OF CHAOS THEORY TO ANALYSIS OF COMPUTER NETWORK TRAFFIC
free download
L Kaklauskas ,2009 ,leidykla.vgtu.lt
Abstract. The article deals with statistical university network traffic, by applying the methods
of selfsimilarity and chaos analysis. The object of measurement is Šiauliai University LitNet
network node maintaining institutions of education of the northern Lithuania region. Time
Software Package of Computer Network Course in Education
free download
Q Yingxu ,Network security, 2010
Abstract—The computer network course is the required course that college computer-related
professional sets up, in regard to the current teaching condition, the teaching of this course
has not formed a complete system, some new knowledge points can’t be added in
Comprehensive Evaluation Model for Computer Network Security with Linguistic Information
free download
Y Li, X Shan
Abstract In this paper, we investigate the multiple attribute group decision making (MAGDM)
problems for for evaluating the computer network security with linguistic information. We
utilize the pure linguistic weighted arithmetic averaging (PLWAA) operator to aggregate
AUTOMATION COMPUTER-NETWORK-BASED PROTOTYPE FOR ELECTRICITY TARIFF MANAGEMENT SYSTEMS
free download
SB Sadiq-Hussain ,ipac.kacst.edu.sa
ABSTRACT: The provision of reasonably priced electrical energy is essential to maintain
and improve the standard of living. Conserving electrical energy has recently become a
distinctive element of our everyday life, at home and in the office. Electrical energy
Performance evaluation of a Wireless Computer Network
free download
JB Lewoc, A Izworski ,Performance evaluation, 2012
Abstract This paper presents a predicted target architecture of an integrated manufacturing
and management system for a manufacturer of household appliances, based on a
metropolitantype infranet and an industrial process control and monitoring wireless
Applications of Optimization and Optimal Control Theory to Computer Network Security
free download
ABSTRACT Computer network security is a high-profile problem that continues to grow in
importance as computer networks become more ubiquitous and as our lives depend on
them more. The combination of the increasing complexity of computer networks and
Global Stability of Worms in Computer Network
free download
BK Mishra ,pvamu.edu
Abstract An attempt has been made to show the impact of non-linearity of the worms through
SIRS (susceptible–infectious–recovered-susceptible) and SEIRS (susceptible–exposed–
infectious–recovered-susceptible) e-epidemic models in computer network. A very
SIjRS E-Epidemic Model With Multiple Groups of Infection In Computer Network
free download
BK Mishra ,International Journal of Nonlinear , 2012 ,internonlinearscience.org
Abstract: In order to protect cyber world from different kind of malicious objects, we strived to
develop SI1I2I3RS (Susceptible, Infectious due to worm, Infectious due to virus, Infectious
due to Trojan Horse, Recovered and Susceptible) model for the transmission of malicious
Factor Analytic Approach to Computer Network/Information Security Awareness in South-Western Nigeria
free download
BK Alese, OJ Olojo, M Tech, OS Adewale
ABSTRACT This study was designed to investigate Computer Network Security awareness
using a factor analytic approach with Principal factoring method. The principal objective of
the study principally was to determine and identify how many latent constructs actually
COMPARISON 07 SOLUTION METHODS FOR COMPUTER NETWORK MODELS*• _
free download
L Kleinrock ,lk.cs.ucla.edu
Summary A discussion of the need and structure of computer networks precedes a
comparison of a number of sonetvorks. Various analytic, simulation, and measurement
approaches are discussed and referenced and the interplay between these-methods is
ICS311 Assignment 1 Broadcasting in a Computer Network
free download
K Fujiwara ,2004 ,hawaii.edu
A computer network is commonly represented by a weighted, undirected graph G=(V, E).
This paper considers a problem of broadcasting data from one computer to all other
computers so that the completion time of all data transmissions for the broadcast is
Improvement of the Computer Network Transmission Band Usage by Packing Agent Technology
free download
SP Tomasz Bartczak ,eng.auburn.edu
Abstract-In this paper the algorithms which could improve transmission band for computer
network has been shown. The analysis of file size distribution has shown that the typical
website has more than 40% of files with sizes smaller than 1kB. Additionally, these small
Multi-Agent System for Informational Support of Collaborative Researchers Work in aComputer Network
free download
petrsu.ru
Abstract The article considers the model of researchers’ interaction when conducting a
collaborative project. We also propose a multi-agent system architecture for informational
support of the process of collaborative research using Internet technologies.
Toolbox to analyze computer-network interaction
free download
M Peuhkuri ,Computer, 1997 ,netlab.tkk.fi
ABSTRACT Understanding the nature of data communications requires tools to collect data
from the computer, the network and their interaction. A tool is needed to get better
understanding of the processes generating traffic to the network.
Real-Time Multi-Node Data Transmission: Designing a Low Latency Computer Network
free download
O JamesTola ,journal.au.edu
Abstract There is a need to create a model for the distribution of data in computer networks
such that almost every computer system on the network participates in the consumption and
re-distribution of the data and no computer system is over-loaded in the process. This
CSE PROJECTS