Science topic
Computer Networks - Science topic
Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing
Publications related to Computer Networks (10,000)
Sorted by most recent
Physics-informed neural network (PINN) prevails as a differentiable computational network to unify forward and inverse analysis of partial differential equations (PDEs). However, PINN suffers limited ability in complex transient physics with nonsmooth heterogeneity, and the training cost can be unaffordable. To this end, we propose a novel framewor...
The AI era has ushered in a new wave of opportunities for enhancing classroom education, particularly in the realm of higher education. This study investigates the integration of AI and mobile learning technologies to promote innovation and reform in education. It explores how AI-driven platforms, using soft computing networks, can improve students...
The fast growth in the field of Internet of Things has brought the development of many safety services and applications in the world transportation system. Tasks generated by these vehicular applications are resource intensive and needs to be processed on the fly. To satisfy the computation requirements of these applications, tasks generated by the...
An Intrusion Detection System is the process of monitoring events within a computer network and analyzing them for unusual behavior. Moreover, IDS detects attempts at misuse, whether by authorized users or external parties who seek to abuse privileges or exploit security vulnerabilities. Computer intruders, who can be found across the internet, pos...
1. Introdução As Tecnologias da Informação e Comunicação desempenham um papel essencial na educação, aproximando os conteúdos da realidade por meio de ferramentas digi-tais. Nesse contexto, a Realidade Aumentada, Realidade Virtual, Realidade Mista e o Metaverso têm se destacado como tecnologias imersivas que promovem maior en-gajamento e escalabili...
This study designs and tests a network security system based on a combined Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) framework. In this study, distributed processing and reinforcement learning methods in combination with differential privacy are introduced into the proposed system to enhance attack detection and network...
Low Earth orbit (LEO) satellite networks have shown extensive application in the fields of navigation, communication services in remote areas, and disaster early warning. Inspired by multi-access edge computing (MEC) technology, satellite edge computing (SEC) technology emerges, which deploys mobile edge computing on satellites to achieve lower ser...
Blockchain-based federated learning (FL) has recently garnered significant attention as a trusted decentralized learning paradigm. However, traditional FL faces critical challenges: synchronous FL suffers from stragglers that delay training, while asynchronous FL risks model instability due to inconsistent updates. Moreover, processing blockchain c...
The rapid advancement of computer networks offers substantial benefits but also introduces growing cybersecurity risks. Cyber-attacks are increasing in both frequency and sophistication, demanding continuous improvements in security systems. Consequently, intrusion detection technologies are being actively researched and optimized to enhance threat...
Cybersecurity involves protecting computer networks, systems, and data from unauthorized access and disruptions using advanced technologies. The purpose of this research is to establish a novel cyber security framework for strengthening cloud data protection. In this paper, we propose a novel Dung Beetle optimization-redefined Intelligent Random Fo...
Data center load balancing is a technique used in cloud computing that divides workloads among several computing resources, including computers, network connections, processors, and drives. Resource usage, maximum output, reduced response time, and preventing resource overload are the main goals of load balancing. Redundancy and reliability can be...
The rapid growth of network data has increased the complexity of detecting anomalies, which are crucial for ensuring the security and integrity of information systems. This study investigates the use of the Isolation Forest algorithm for anomaly detection in network traffic, utilizing the Luflow Network Intrusion Detection dataset, which contains 5...
This study presents a comprehensive review and synthesis of recent research advancements integrating quantum-inspired optimization and artificial intelligence (AI) in data centers and edge computing networks. With the exponential growth in data generation and the demand for real-time processing, AI-driven infrastructures face challenges in scalabil...
There are various forms of cyber security attacks that target computer networks and systems with the
aim of destroying important data, files, documents or systems to control them or gaining access to a
computer network or institution. Internet attacks are common and an interesting topic due to the devel
opment and diversity of the methods and means...
This paper explores the concepts of fraud and E-fraud, delineating their definitions, differences, applications, methods, and the Algerian legal framework in combatting E-fraud. Fraud is defined as a deliberate act of deception aimed at securing unlawful gain, while E-fraud is characterized by the use of digital technologies and computer networks f...
The rapid growth of computer networks has led to designing a more flexible and efficient architecture called Software-Defined Networking (SDN). SDN decouples the control plane from the physical networking devices in the data plane. SDN’s global perspective and programmability have inspired researchers to develop ideas that would have been difficult...
Malware is a malicious software that is used to launch attacks of different types in computer networks and cyber space. Several signature and machine learning-based approaches have been used for the identification of malware types in the past. However,signature-based detection approaches have been reported to have serious limitations which gave roo...
المنتجات الرقمية المشفرة
هناك العديد من المنتجا الرقمية التي يتم إطلاقها عبر الفضاء الإلكتروني.
إلا أن هناك منتجا رقمية أصاااولية ) أصاااول ملكية( رائده تعد دليلا جيدا لتعري
المنتجا الرقمية منها
اولاً:دفتر الاستاذ العام للتشفير الرقمي ) block chain )
دفتر الأستاذ هو مصطلل محاسبي لتدوين وتسجيل المعاملا المالية التي
تتم في المنظمة عبر طريقة القيد الم...
The case of a star topology is studied on the example of Ikeda model-famous interdisciplinary system. The existence and stability conditions for the complete synchronization between constituent systems are found. An agreement between numerical simulations and theory is excellent. Some security implications for the computer networks are underlined.
In the era of digitalization, Wi-Fi networks have become an essential need for government agencies, including the General Elections Supervisory Agency. This study aims to analyze the performance of the Wi-Fi network at the BAWASLU Office in East Nusa Tenggara using Quality of Service (QoS) parameters such as throughput, delay, and packet loss, with...
Quality of Service (QoS) is a fundamental aspect of modern computer networks, directly influencing performance and user experience. Key parameters such as latency, throughput, packet loss, and jitter play crucial roles in determining network efficiency. Traditional QoS management approaches, often rule-based or heuristic-driven, lack adaptability t...
Globalisation has transformed the way people live, work, and interact. In recent decades, businesses of all sizes have been profoundly affected by exponential computer, network, and data storage technology advances. Virtually all industries, from the healthcare to the automotive sector, have integrated digital technologies into their work. This phe...
Fluid antenna (FA) array is envisioned as a promising technology for next-generation communication systems, owing to its ability to dynamically control the antenna locations. In this paper, we apply FA array to boost the performance of over-the-air computation networks. Given that channel uncertainty will impact negatively not only the beamforming...
Network Intrusion Detection Systems (NIDS) are essential for protecting computer networks because they keep an eye on traffic and spot harmful activity. The HC-DTTSVM (Hierarchical Clustering Decision Tree Twin Support Vector Machine) technique and Gradient Boosting Decision Tree (GBDT) technology are combined in this study to present a novel way t...
To achieve the low carbon optimization in hydrogen-based integrated energy system(HIES), this paper proposes a dynamic carbon emissions optimization method for HIES based on cloud-edge collaborative CBAM-BiLSTM-PSO network. Firstly, based on the theory of carbon emission flow, the carbon emissions in HIES are converted from the source to multiple e...
The Enterprise network effectively comprises the infrastructure, hardware and software systems, and the communication protocols used to deliver end-to-end services. The network may be architected, designed, deployed, optimized, and configured to perform a unique set of business and technical objectives. In this project we can create multiple connec...
The construction of self-evaluation and feedback management system for students in English language teaching is based on information technology and with the help of computer network technology, multimedia technology, data collection and analysis algorithm, and English language teaching theory. The system can reduce the workload of teachers and pare...
In the field of data communication, cryptography plays a crucial role in ensuring data confidentiality, authenticity, and integrity. This technique is essential when transmitting sensitive information over public networks, preventing unauthorized access or manipulation. In the context of internet cafés (warnet), which provide global computer networ...
The problem at SMK Nurul Islam Sekarbela is the lack of student learning outcomes in the Basic Computer Network and Telecommunication Engineering subject at SMK Nurul Islam Sekarbela in the 2023/2024 Academic Year. The purpose of this study was to determine the Use of Cisco Packet Tracer on the Learning Outcomes of Class X Students in the Basic Com...
The Internet of Vehicles (IoV) requires advanced safety, security, and services in Intelligent Transportation Systems (ITS). Frequent broadcast message intervals and Dedicated Short-Range Communication (DSRC) make validating messages in such short timeframes extremely challenging. Additionally, current authentication protocols cannot meet the deman...
In the current digital landscape, information security has become a critical necessity given the escalating frequency and sophistication of cyberattacks across global computing networks. Cryptography is the science and practice of securing information by transforming it into a format that is unreadable or inaccessible to unauthorized parties. The s...
Mobile edge computing architecture (MEC) can provide users with low latency services by integrating computing, storage and processing capabilities near users and data sources. As such, there has been intense interest in this topic, especially in single-server and homogeneous multi-server scenarios. The impact of network heterogeneity and load fluct...
Graph theory plays a crucial role in understanding and analyzing network topologies, offering powerful tools to model, analyze, and optimize complex systems. This field explores the relationships between nodes (vertices) and edges (connections), providing a framework for investigating connectivity, flow, and structure in various domains, including...
The primary goal of my Ph.D. study is to develop provably efficient and practical algorithms for data-driven online sequential decision-making under uncertainty. My work focuses on reinforcement learning (RL), multi-armed bandits, and their applications, including recommendation systems, computer networks, video analytics, and large language models...
This contribution investigates the case of “BreadTube”, a leftist counterpublic that first formed on YouTube in opposition to the dominance of right-wing voices and networks on the platform. To gain a better understanding of the inner workings of this media-based collectivity, this article analyzes an internal controversy to reconstruct the tacit a...
Parallel Communicating Finite Automata (PCFA) extend classical finite automata by enabling multiple automata to operate in parallel and communicate upon request, capturing essential aspects of parallel and distributed computation. This model is relevant for studying complex systems such as computer networks and multi-agent environments. In this pap...
In the computational offloading problem of edge cloud computing (ECC), almost all researches develop the offloading strategy by optimizing the user cost, but most of them only consider the delay and energy consumption, and seldom consider the task waiting delay. This is very unfavorable for tasks with high sensitive latency requirements in the curr...
The Imaging Neutral Particle Analyzer (INPA) at DIII-D is a diagnostic system used to accurately resolve the energy and spatial distributions of fast ions in fusion plasmas. A novel artificial intelligence (AI) technique named INPA-net is based on Reservoir Computing Networks and developed here to predict active and passive signals produced by char...
This study introduces an innovative simulation optimization framework to address network reliability optimization through component configuration. Unlike traditional approaches, this methodology uniquely integrates metaheuristic algorithms—simulated annealing (SA) and genetic algorithm (GA)—with Monte Carlo simulation (MCS), creating hybrid framewo...
Background
Digital connectivity drives global innovation, ensuring computer network security is more critical than ever. With increasing interconnectivity, cyber threats are becoming more sophisticated, highlighting the urgent need for advanced defense mechanisms.
Objective
This research proposed the investigation of the Genetic Algorithm with Bac...
Este artigo apresenta a experiência de curricularização da extensão no curso de Tecnologia em Redes de Computadores, por meio da execução de dois projetos voltados à integração entre conhecimento acadêmico e prática social. O objetivo foi preparar os alunos para demandas da comunidade, promovendo uma formação alinhada às necessidades locais. A meto...
Background:Information and Communication Technologies play a fundamental role in education, bringing real-world content closer to students and expanding learning opportunities. Immersive virtual laboratories stand out by enabling experimentation and overcoming the difficulties of accessing physical laboratories. Hybrid approaches have emerged to ad...
The analyses presented show that in modern computer networks, the protocols RSVP, RTP, RTCP, and MPLS ensure reliable and transparent packet transfer and maintain the required quality of service. Comparison of IP technology shows that the best result can be achieved by jointly utilizing the advantages of these technologies. Based on the analysis of...
Blockchain is a shared unchangeable ledger that makes it easier to track assets and record transactions inside a company network. The Blockchain network allows for the tracking and trading of anything of value. A distributed database that is shared via a computer network is called a blockchain. Since the Blockchain is still in its infancy, there ar...
The stellar systems as seen as classical states arising out of dysfunction of the conscious quantal field structured quantum gravity mediated quantum computing networks of the brain. The black hole-white hole transition zones and dense quantum gravity structuring consciousness radiates gravitational and anti-gravitational fields from the event hori...
AI/ML-based tools are at the forefront of resource management solutions for communication networks. Deep learning, in particular, is highly effective in facilitating fast and high-performing decision-making whenever representative training data is available to build offline accurate models. Conversely, online learning solutions do not require train...
Aiming at the technical challenges of low latency and high reliability in the complex communication environment of the intelligent industrial network, and the trend of the current Internet of Things architecture is increasingly IP‐based, this paper proposes a fast and accurate IP packet forwarding method applied to the routing node, aiming at deali...
The universe consists of quantal computing networks made up of conscious quantal fields. They are made up of quantum gravity made up of strings constituting what is known as the information universe. The quantum gravity is made up of massive gravity or gravitons. The conscious quantal fields have quantal synchronization and quantum entanglement in...
In 2024, Sustainability celebrates its 15th year of publication. To commemorate this milestone, this study presents a retrospective bibliometric analysis of the journal, utilizing data from the Scopus database. Through a range of bibliometric tools, we analyze Sustainability’s growth in terms of publication and citation impact. Citation data mainly...
Telekommunikasiya sahəsində şəbəkənin intellektual nəzarətinə, trafikin idarə edilməsinə və optimallaşdırılmasına nail olmaq üçün proqram təminatı ilə müəyyən edilmiş şəbəkədə (SDN) süni intellekt (AI) və böyük verilənlər texnologiyasından istifadə etmək böyük əhəmiyyət kəsb edir. Bu məqalədə süni intellektə əsaslanan müasir kompüter şəbəkələri, tr...
Considering the rapid growth in user count and increasing demand for higher data rates, we need to optimize network strategies to accommodate more users and increase the network throughput. Therefore, this work aims to accommodate maximum IoT nodes and increase the network's throughput simultaneously by optimizing the IoT node association and power...
p>The rapid expansion of cloud computing within business environments, along with the increasing complexity of organizational deployments, has led to a surge in cloud-based attacks on computer networks. These attacks exploit security vulnerabilities and systemic breaches. This study explores robust defense mechanisms by leveraging policy-based conf...
For the application of brain-computer interfaces in fields such as medicine, a method of classifying brain activity with high accuracy using small amount of training data is needed. To apply machine learning to biological signal processing, it is important to develop a method based on a model that matches the in vivo mechanism. While a high dimensi...
Tujuan penelitian ini untuk menghasilkan Learning Management System (LMS) pada materi proses bisnis kelas X TKJ yang valid. Untuk menghasilkan Learning Management System (LMS) Berbasis Moodle pada materi proses bisnis kelas X TKJ yang praktis. Metode penelitian ini menggunakan metode Research and Development (R&D) dengan model pengembangan ADDIE. S...
This study proposes an adaptive multi-modal learning path optimization system based on Graph Convolutional Networks (GCN), attention mechanisms, and reinforcement learning to address the challenges faced by traditional recommendation methods in educational scenarios, including multi-modal data integration, temporal behavior modeling, and dynamic le...
We confront the traditional problem of opinion homophily in online social networks to alt-right communications on Telegram messaging. Using a selected sample of messages from an open-source dataset, we describe the social network of forwarded messages that contain a reference to an alt-tech platform. We build a directed, weighted graph and model th...
Background: Alchornea laxiflora (Benth.) Pax & K. Hoffm. (A. laxiflora) is utilized as a traditional herb for treating several diseases. Objective: Our study aims to identify the active phytochemical candidates from A. laxiflora and analyses to predict their anticancer activity mechanism by employing network pharmacology, molecular docking, and mol...
This book gathers high-quality research papers presented at MICRADS´24 – the 2024 Multidisciplinary International Conference of Research Applied to Defense and Security, held at Universidad Bernardo O'Higgins, in Santiago, Chile, between July 17 and 19, 2024. The main topics covered are, Area A—systems, communication and defense: A1) information an...
The zero trust systems help to improve the overall security of computer networks, while one of the main challenges of zero trust systems is the construction and optimization of continuous authentication models. Aiming at the shortcomings of the existing authentication performance, this paper proposes a continuous authentication model based on an im...
Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of computing, mobile phone communication, passwords in computing and even engineering, unlike in the olden days when cryptography was only about encrypting and decrypting messages with keys. One of...
Network Intrusion Detection System (NIDS) is a mechanism for detecting anomaly in computer networks. Several NIDS techniques have been developed in the past, but these techniques are still limited in detection accuracy, error rate and in detecting new attacks. In this study, a hybrid network intrusion detection framework using a neural network-base...
Recently, the number of insiders of computer networks in companies has increased. Some insiders can be detected when they perform outside activities, such as sending a file or opening blocked websites, to enter the company network. Another class of insiders is the company's employees, and it is difficult to identify them. And here lies the problem—...
The research community has been showing an increasing amount of interest in the topic of Quality of Service (QoS) in computer networks. Now a days maximum network applications expect specific QoS assurance. In essence, Quality of Service (QoS) is essentially the capability of the network to provide the resources to satisfy the requirements of speci...
In the context of rapid advancements in educational technology, Active Interactive Learning Environments (ILEs) have emerged as key tools for enhancing instructional outcomes and student engagement. This paper presents an innovative active interactive learning system based on multi-modal chain-of-thought (CoT) reasoning, aiming to optimize personal...
The development of information technology and the internet has had a significant impact on various aspects of life, with many positive and negative effects that cannot be ignored. One of the negative impacts is the increasing ease with which criminals can commit cyber crimes through the virtual world. Information technology crimes generally refer t...
A software implementation of the problem of multi-criteria optimization of the selection of information protection means (IPS) for a university computer network has been developed based on the evolutionary algorithm NSGA-II. A cybernetic model for selecting the optimal set of IPS has been considered taking into account a set of criteria, including...
In modern IT systems and computer networks, real-time and offline event log analysis is a crucial part of cyber security monitoring. In particular, event log analysis techniques are essential for the timely detection of cyber attacks and for assisting security experts with the analysis of past security incidents. The detection of line patterns or t...
With the development of edge computing and the Internet of Things (IoT) technologies, the relevance of optimizing energy consumption in distributed networks is increasing. Traditional energy management methods are often inefficient due to the lack of adaptation to dynamic load conditions and limited coordination capabilities between nodes. This pap...
Currently, the use of computer networks is very necessary, such as for teaching and learning activities and work. SMAl N 7 Bengkulul Selatan already has a network that is used for teaching and learning activities. Currently, the computer network in the computer laboratory of SMAl N 7 Bengkulul Selatan has 24 Computer Units. The computer network in...
The rapid advancement of quantum computing poses a significant challenge to traditional cryptographic methods, necessitating the adoption of quantum cryptography for securing network communications. This paper explores the principles of quantum cryptography, its role in mitigating quantum threats, and its integration into modern computer networks....
The development of non-terrestrial networks (NTNs) and their integration with terrestrial networks is a potential research area in sixth-generation (6G) networks. NTNs are favored for their cost-effective on-demand deployment and aim to provide ubiquitous coverage, uninterrupted connectivity, and efficient edge computing capabilities. In addition,...
This paper introduces a prolonged SEIR epidemic model in computer networks that addresses the transmission dynamics of a virus and how it can be controlled. By employing artificial neural networks (ANNs) and training them using the Levenberg-Marquardt (LM) algorithm, we study the behavior of the model and forecast virus spreading in the network. We...
With the development of computer network technology, distributed database has become a current research hotspot. Based on the structural characteristics of distributed database systems, the article leads to the optimization of distributed database queries at the global optimization level. Then, according to the basic principle of genetic algorithms...
A quantum version of an internet, called a quantum internet, holds promise for achieving distributed quantum sensing and large-scale quantum computer networks, as well as quantum communication among arbitrary clients all over the globe. The main building block is efficient distribution of entanglement—entangled bits (ebits)—between arbitrary client...
The rapid development of artificial intelligent clusters and computing networks demands solutions with minimized power consumption and latency to scale effectively. Traditionally, high-speed intensity modulation with direct detection (IM/DD) optical interconnects rely heavily on digital signal processing (DSP), leading to substantial power consumpt...
Aim. Implement a stochastic representation of the wave function for a pair of entangled soliton functions in a liquid crystal. Show the applicability of a special soliton representation of quantum mechanics for modeling real entangled systems. Methodology. The central place in the study is occupied by the method of mathematical modeling. As part of...
In today's business landscape, reliable network infrastructure is essential for uninterrupted operations. As networks increase in complexity, effective monitoring systems become crucial to ensure device performance and availability. This study presents a multi-agent-based system for monitoring computer network devices, utilizing autonomous agents t...
Computer networks are the foundation of modern digital infrastructure, facilitating global communication and data exchange. As demand for reliable high-bandwidth connectivity grows, advanced network modeling techniques become increasingly essential to optimize performance and predict network behavior. Traditional modeling methods, such as packet-le...
The development of computer networks provides learners with new educational platforms for knowledge acquisition and skill learning. In this study, a learning behavior analysis model based on distance education platform is formed, and clustering analysis, lagged sequence analysis and association rule mining are used to visually analyze learners’ onl...
In response to the practical needs of automatic monitoring and control systems in the field of computer networks at present, this study constructs a new system development strategy with modular thinking as the core. After in-depth exploration of system requirements, this study points out the problems existing in traditional systems and proposes inn...
This paper proposes a public key cryptosystem strategy based on group theory as the core of cooperative defense data encryption technology to build a distributed cooperative defense system. By establishing a computer network communication data encryption model based on an NTRU-like public key cryptosystem, link layer encryption, and endto-end encry...
With the growing maturity of big data technology, the traditional college students’ employment guidance methods in institutions of higher education have exposed the problems of low data processing efficiency and rough data classification. In order to realize the innovation of employment guidance methods, this paper takes data mining technology as t...
Fractals are geometric patterns that appear self-similar across all length scales and are constructed by repeating a single unit on a regular basis. Entropy, as a core thermodynamic function, is an extension based on information theory (such as Shannon entropy) that is used to describe the topological structural complexity or degree of disorder in...
The rising prevalence of Alzheimer’s disease (AD), particularly among older adults, has driven increased research into its underlying mechanisms and risk factors. Aging, genetic susceptibility, and cardiovascular health are recognized contributors to AD, but how the age of onset affects disease progression remains underexplored. This study investig...
Large‐scale healthcare systems face significant challenges in ensuring security and privacy when sharing vast amounts of data across various e‐health entities. Existing studies often struggle with high processing costs, latency, energy consumption, and delayed response times. To address these issues, this research proposes a novel Blockchain‐Assist...
Edge computing technology has led to the emergence of a variety of emerging businesses, but it also introduces more uncertain security threats and demand for differentiated security services. This paper focuses on the security protection technology of the English education network and proposes a statistically based incremental network traffic featu...
Nmap Is a free and open-source tool that helps with network exploration, management, and security auditing.
It is a versatile network scanner that can identify hosts and services on a computer network, and it can also be used to identify security vulnerabilities on a network
This study guide presents 10 essential questions on TCP/IP, with a particular focus on the Transmission Control Protocol (TCP). It includes both multiple-choice and open-ended questions designed to assess and enhance understanding of key TCP concepts such as flow control, congestion control, sequence numbers, and packet loss handling. The guide is...
Cybersecurity has become a critical concern due to the exponential growth of the Internet of Things (IoT), computer networks, and associated applications, which have introduced new vulnerabilities and increased the risk of cyberattacks. Detecting such anomalies and designing an efficient intrusion detection system (IDS) is essential to secure inter...
In order to detect denial- of- service (DoS) and distributed denial of service (DDoS) intrusions on the organization's e- healthcare data warehouse infrastructure, the authors of this study proposed a computing framework that combines a federated learning system based on blockchain technology. A Message Queuing Telemetry Transport (MQTT) broker gat...
Although the theory of multiple intelligences is widely recognized, its application remains new in Albania, with notable gaps in practice. This study aims to explore teachers' perceptions of the theory of multiple intelli-gences, analyze its application, and evaluate the role of technology in fostering these intelligences while promoting more colla...
The Internet of Multimedia Things (IoMT) represents a significant advancement in the evolution of IoT technologies, focusing on the transmission and management of multimedia streams. As the volume of data continues to surge and the number of connected devices grows exponentially, internet traffic has reached unprecedented levels, resulting in chall...
Although benefits from caching in US HEP are well-known, current caching strategies are not adaptive i.e. they do not adapt to changing cache access patterns. Newer developments such as High Luminosity - Large Hadron Collider (HL-LHC), Deep Underground Neutrino Experiment (DUNE), a steady move toward streaming readout based Data Acquisition systems...
Physical Internet (PI) has emerged as an open global logistics system in which physical, digital and operative interconnectivity are combined by units, interfaces and protocols. The PI initiatives have revolutionized the logistics industry, which significantly promotes logistics sustainability, digitalization and the interconnection of logistic ser...
Stellar galaxies and planets are biological in origin and conscious working as organic quantal computers structured on conscious quantal fields. They are formed of symbiotic tissue organism networks composed of magnetite actinidic multicellular nanoarchaeal colonies with symbiotic primitive mitochondria-like proteobacteria. The creation of the univ...
Stellar galaxies and planets are biological in origin and conscious working as organic quantal computers structured on conscious quantal fields. They are formed of symbiotic tissue organism networks composed of magnetite actinidic multicellular nanoarchaeal colonies with symbiotic primitive mitochondria-like proteobacteria. The creation of stellar...
To provide effective data transfer and connectivity, computer network creation and configuration are essential components of contemporary communication systems. The presentation examines important facets of network access with an emphasis on integrating the physical and data link layers within the OSI and TCP/IP models. It discusses network media,...
Stellar galaxies and planets are biological in origin and conscious working as organic quantal computers structured on conscious quantal fields. They are formed of symbiotic tissue organism networks composed of magnetite actinidic multicellular nanoarchaeal colonies with symbiotic primitive mitochondria-like proteobacteria. The creation of the univ...