free -computer network
Engaging computer science students through gamification in an online social network based collaborative learning environment
free download
Gamification is the use of game mechanics such as rewarding points and achievement badges to engage target audience and encourage desired behaviors. Gamification has gained a great surge of interest in recent years as an effective approach to engage existing
Method for cyberincidents network -centric monitoring in critical information infrastructure
free download
In this paper the method of network -centric monitoring of cyberincidents was developed, which is based on network -centric concept and implements in 8 stages. This method allows to determine the most important objects for protection, and predict the category of
Computer networks and internets
free download
Network : system for connecting computer using a single transmission technology Internet: set of networks connected by routers that are configured to pass traffic among any computers attached to networks in the set o Short distance wireless computer network
Mobility based cluster head selection algorithm for mobile ad-hoc network
free download
(MANETs) has become a crucial research issue in modern days, because clustering can improve system performance of MANETs. As MANETs have limited battery power supply, cluster formation is costly in terms of power depletion of nodes in the cluster. This is due to
Linear crossed cube (LCQ): a new interconnection network topology for massively parallel system
free download
Scalability and Complexity are crucial performance parameters in the design of Interconnection networks for multiprocessor system. This paper proposed and analyzed a new scalable interconnection network topology named as Linear Crossed Cube (LCQ). LCQ
A study of comparison of Network Simulator-3 and Network Simulator-2
free download
Network simulation is undoubtedly one of the most prevalent evaluation methodologies in the area of computer networks. While simulation is not the only tool used for data networking research, it is extremely useful because it often allows research questions and prototypes to
Network simulation tools survey
free download
In the network research area, establishing of network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. So implementation of a whole network in real world is not easily possible and very costly to. The simulator helps the
A survey of Wireless Sensor Network technologies
free download
ISSN 1476-2986 Page 3. A survey of Wireless Sensor Network technologies: research trends and middlewares role Eiko Yoneki and Jean Bacon University of Cambridge Computer Laboratory
Network security using cryptographic techniques
free download
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational
COMPUTER PROGR MS ND SOCI L NETWORK N LYSIS
free download
This is a review of the history and current state of the art in computer application for social network analysis. It documents a development from small task-specific programs to large general purpose program packages. It also shows a trend away from mainframe computers
Network and internetwork security: principles and practice
free download
Page 1. NETWORK AND INTERNETWORK SECURITY CHAPTER 10 NETWORK MANAGEMENT SECURITY 412 10.1 Basic Concepts of SNMP 413 10.2 SNMPvl Community Facility 421 10.3 SNMPv2 Security Facility 424 10.4 Problems 441 Glossary 443
Data mining techniques for ( network ) intrusion detection systems
free download
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data
Application based study on wireless sensor network
free download
ABSTRACT A wireless sensor network is type of wireless network . Basically it consist a collection of tiny device are called sensor node, sensor node has a resource constraint means battery power, storage and communication capability. These sensor nodes are setThe term back end comes directly from the front- end communications processors now in general use, but back-end systems differ from front-end systems in both performance, such as speed of data transfer, and functional emphasis (see Figure 1). Front-end machines evolved from early
Using OPNET modules in a computer networks class at Mercer University
free download
Control Protocol) congestion windows. This paper also discusses ways in which the OPNET modules have been developed so that students learn computer network concepts, and not just how to use OPNET software. Introduction
The human immune system and network intrusion detection
free download
Keywords: computer immune systems, human immune systems, network intrusion detection Because of this study, it is thought that the application of computer immune systems to network -based intrusion detection is likely to provide significant benefits over other approaches
Network -based intrusion detection using neural networks
free download
INTRODUCTION Intrusion Detection attempts to detect computer attacks by examining data records observed by processes on the same network Many computer networks, including the widely accepted Ethernet (IEEE 802.3) network , use a shared medium for communication
A brief study and comparison of snort and bro open source network intrusion detection systems
free download
Security administration plays a vital role in network management tasks. The intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical network information systems. There are plenty of IDSes to choose from
Parallelization of a backpropagation neural network on a cluster computer
free download
This paper compares the performance of two parallelization strategies for a backpropagation neural network on a cluster computer : exemplar parallel and node parallel strategies. Equations for calculating the theorectial costs of these two strategies are proposed based on
The impact of computer networking on community: A social network analysis approach
free download
The quality of life in a community can be seen as the nexus ofsocial capitaland civic engagement (Putnam 199 Coleman 1988).Social capitalaccumulates through social networks and trust, and the norms of mutual reciprocity that these relationships foster CSE PROJECTS