Science topic

Computer Networks - Science topic

Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computer Networks (10,000)
Sorted by most recent
Article
Full-text available
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the proliferation of Internet connections and the advent of new technologies such as the IoT. Various and so...
Article
Full-text available
The family of room temperature atomic scale magnetometers is currently limited to nitrogen-vacancy centers in diamond. However, nitrogen-vacancy centers are insensitive to strong off-axis magnetic fields. In this work, we show that the well-known TR12 radiative defect in diamond, exhibits strong optically detected magnetic resonance (ODMR) signal u...
Article
Full-text available
Computer networks are the fundamental infrastructure of intelligent environments (IEs). Software defined network (SDN) is an emerging software-based network architecture that separates the control plane from data plane to facilitate dynamic network management and configuration; two important parameters which are essential in real-time IEs. This sep...
Article
Full-text available
In the era of the Internet of Things (IoT), the volume of data is increasing immensely causing rapid growth in network data communication and data congestion. Computational offloading thus becomes a crucial and imperative action in terms of delay-sensitive task completion and data processing for the resource constraint end-users. Nowadays fog compu...
Chapter
Full-text available
O aumento exponencial de crimes virtuais estimulados pelo grande avanço das tecnologias de comunicações e a consolidação da internet como o meio de comunicação amplamente difundido entre as massas, acarretou na constituição de uma ciência forense capaz de investigar e proporcionar provas fiéis para a análise e juízo de crimes onde os sistemas i...
Article
Full-text available
jats:p>DiGeSt 9(1) General Issue - What are you reading?</jats:p
Article
Full-text available
Mobile edge computing has been developed as a promising technology to extend diverse services to the edge of the Internet of Things system. Motivated by the high flexibility and controllability of unmanned aerial vehicles (UAVs), a multi‐UAVs‐assisted mobile edge computing system is studied to reduce the total consumption of time and energy of term...
Article
Full-text available
An important function of the brain is to predict which stimulus is likely to occur based on the perceived cues. The present research studied the branching behavior of a computational network model of populations of excitatory and inhibitory neurons, both analytically and through simulations. Results show how synaptic efficacy, retroactive inhibitio...
Preprint
Full-text available
Cascaded operations play an important role in traditional electronic computing systems for the realization of advanced strategies. Here, we introduce the idea of cascaded operations into all-optical spatial analog computing. The single function of the firstorder operation is difficult to meet the requirements of practical applications in image reco...
Article
Full-text available
With the development of information technology, the application of a new generation of information technologies, such as big data, Internet Plus, and artificial intelligence, in the sports field is an emerging, novel trend. This paper examined the relevant research results and literature on physical education, computer science, pedagogy, management...
Article
Full-text available
Over the last decade, the usage of Internet of Things (IoT) enabled applications, such as healthcare, intelligent vehicles, and smart homes, has increased progressively. These IoT applications generate delayed- sensitive data and requires quick resources for execution. Recently, software-defined networks (SDN) offer an edge computing paradigm (e.g....
Article
Full-text available
Simulations are a powerful tool to explore the design space of hardware systems, offering the flexibility to analyze different designs by simply changing parameters within the simulator setup. A precondition for the effectiveness of this methodology is that the simulation results accurately represent the real system. In a previous study, we introdu...
Preprint
Full-text available
Named Data Networking (NDN) offers promising advantages in deploying next-generation service applications over distributed computing networks. We consider the problem of dynamic orchestration over a NDN-based computing network, in which nodes can be equipped with communication, computation, and data producing resources. Given a set of services with...
Research
Full-text available
: 'Privacy, privacy everywhere but not a safety method to implement it': a harsh reality of today's world. With the precipitation of more data (2 x 10 19 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to er...
Article
Full-text available
The connection between two or more computing devices utilizing a media is what is known as a computer network. Here, the medium facilitates information sharing among these connected devices. Printers, routers, DVD players, and other pertinent devices can all be connected to these devices, regardless of whether they are personal PCs, servers, mainfr...
Article
Full-text available
In recent years, methods based on deep convolutional neural networks (CNNs) have dominated the classification task of hyperspectral images. Although CNN-based HSI classification methods have the advantages of spatial feature extraction, HSI images are characterized by approximately continuous spectral information, usually containing hundreds of spe...
Article
Full-text available
Intrusion Detection Systems (IDS) are critical components of cyber security because they recognize network anomalies traffic. Severe security concerns are currently posed to the Internet and computer networks. These threats always evolve and will eventually mutate into new and undiscovered varieties. We propose putting it into action for deep learn...
Article
Full-text available
Data transmission and retrieval in a cloud computing environment are usually handled by storage device providers or physical storage units leased by third parties. Improving network performance considering power connectivity and resource stability while ensuring workload balance is a hot topic in cloud computing. In this research, we have addressed...
Article
Full-text available
Mobile edge computing can meet the needs of users in real time by pushing cloud resources, such as computing, network, and storage, to the edge of a mobile network. Although mobile edge technology has brought many conveniences to mobile services, many security problems, such as mutual authentication between mobile users and servers, and the imperso...
Article
Full-text available
With the popularization and application of the Internet, information related application technology is constantly infiltrating in the work and life of human beings, playing an unprecedented and increasingly important role. In this paper, in order to completed the application of computer network information security technology management, the author...
Article
Full-text available
The principal and supreme concern in medical information systems is the issue of safe guarding the electronic health records of patients. Defending a health care industry’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom graph topologies are attractive networks that are potenti...
Article
Full-text available
At present, computer network technology is developing rapidly, and has been applied in many fields. Under this background, this paper analyzes the application of computer network technology in electronic information engineering, taking information warfare as an example. In this paper, the group decision algorithm was introduced into the fuzzy multi...
Article
Full-text available
Firefly algorithm (FA) is a simple and effective swarm intelligence algorithm, which has received wide attention from scholars. In original FA, each firefly must be compared with other fireflies in brightness, but it may not move, which may result in waste of system resources. Therefore, an enhancing firefly algorithm with sliding window (SWFA) is...
Article
Full-text available
In this paper, we investigate intelligent ubiquitous computing for future unmanned aerial vehicle (UAV)-enabled mobile edge computing network (MEC) systems, where multiple users process some computational tasks with the help of one computational access point (CAP), under the jamming from a UAV attack. Taking into account that the system may operate...
Article
Full-text available
With the continuous progress and development of modern science and technology, the research on cloud computing-related fields is constantly conducting more in-depth exploration. During the real-life use of cloud computing operations, as the number of tenants continues to increase, the resource usage load capacity of the relevant platform has also u...
Article
Full-text available
In quantitative structure-property and structure-activity relationships studies, several graph invariants, namely, topological indices have been defined and studied due to their numerous applications in computer networks, biotechnology, and nanochemistry. Topological indices are numeric parameters that describe the biological, physical, and chemica...
Article
Full-text available
Intrusion Detection System is a device or software in the field of cybersecurity that has become an essential tool in computer networks to provide a secured network environment. Machine Learning based IDS offers a self-learning solution and provides better performance when compared to traditional IDS. As the predictive performance of IDS is based o...
Article
Full-text available
With the rapid development of information technology, information network has become the fundamental guarantee of social progress. The network is the basic material foundation of the information society. It is ubiquitous, and human activities are highly dependent on it. Education is also inseparable from the Internet. Online learning is emerging as...
Article
Full-text available
For the purpose of addressing or eliminating the influence of low-carbon city construction effectively, it is crucial to carry out qualitative analysis on the evolutionary process in the construction of the low-carbon city based on the similarity knowledge identification matching algorithm. The ecological transformation of consumption patterns is i...
Article
Full-text available
With the rapid development of computer networks and multimedia technology, independent e-learning has become an integral part of modern education. However, the allocation of time and space for teaching and learning, the lack of instruction and guidance necessary for self-directed learning for students, and the development of e-learning are becoming...
Article
Full-text available
Privacy is a primary consideration when connecting computer networks and utilizing Internet-based financial services. Large companies with a substantial workforce want to pay their employees fairly, efficiently, and securely via the Internet. Malicious users attempt to commit fraud to obtain sensitive information about businesses/users or steal the...
Article
Full-text available
Financial management is one of the most core tasks of a social team and an important link related to the survival of enterprises and the economic development of the country. Therefore, financial management is regarded as a top priority from the national tax and financial system to enterprises and individuals. However, with the rapid development of...
Preprint
Full-text available
Technological advances in the telecommunications industry have brought significant advantages in the management and performance of communication networks. The railway industry, where signaling systems are now fully computerized, is among the ones that have benefited the most. These interconnected systems, however, have a wide area exposed to cybera...
Article
Full-text available
Cyberattacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. In this study, we evaluate and compare four features selection methods, seven classical machine learning algorithms, and the deep learning algorithm on one million random instances of CSE-CIC-IDS2018 big data set...
Article
Full-text available
Motivated by the fast advancements in artificial intelligence (AI) technologies, recent research has moved towards using machine learning and deep learning to detect and classify security attacks in computer networks. However, most prior works adopt supervised learning methods, and the performance heavily depends on the amount of labeled data used...
Article
Full-text available
Background Neuronal hyperexcitability and inhibitory interneuron dysfunction are frequently observed in preclinical animal models of Alzheimer’s disease (AD). This study investigates whether these microscale abnormalities explain characteristic large-scale magnetoencephalography (MEG) activity in human early-stage AD patients. Methods To simulate...
Article
Full-text available
In order to cope with the frequent challenges of network security issues, a method of applying artificial intelligence technology to computer network security communication is proposed. First, within the framework of computer network communication, an intelligent protocol reverse analysis method is proposed. By converting the protocol into an image...
Article
Full-text available
In order to solve the practical problem that the security of computer network information cannot be guaranteed, which seriously affects the network performance, the author proposes a public key data encryption system based on PKI. The system proposed by the author is based on the public key cryptographic algorithm RSA, including implementation of d...
Article
Full-text available
In order to meet the new requirements of fault diagnosis response and intelligent degree in the current computer network, a fault detection of computer communication network based on an improved neural network algorithm is proposed. First, from the perspective of deep learning, based on the KDD99 data set, the network fault diagnosis method based o...
Preprint
Full-text available
In this paper, we focus on the problem of data sharing over a wireless computer network (i.e., a wireless grid). Given a set of available data, we present a distributed algorithm which operates over a dynamically changing network, and allows each node to calculate the optimal allocation of data in a finite number of time steps. We show that our pro...
Article
Full-text available
With the rapid development of network technology, network users have higher and higher requirements for understanding and using the network. At present, the wide application of cloud technology provides the best solution for people. Network is the main carrier of information exchange and interpersonal communication and a new way for human beings to...
Article
Full-text available
In order to better control and repair resource and environmental problems, the state has invested a lot of manpower, material resources, and funds and issued corresponding ecological and environmental protection measures. As the national environmental supervision mechanism, the resource and environmental audit department is responsible for the supe...
Article
Full-text available
Network security situation awareness is a critical basis for security solutions because it displays the target system’s security state by assessing actual or possible cyber-attacks in the target system. Aiming at the security and stability of global information flow, this paper studies the perception and measurement of the overall situation of netw...
Article
Full-text available
In the present era computer security and authentication has become an important issue for computer users to protect their important data from the impostors and intruders. Many access applications depend on the general password authentication. A password is a secret word or phrase (combination of alphabet, numbers, and special character) that allows...
Thesis
Full-text available
According to recent studies, Malicious Software is storing itself in the system as a temporary file using a variety of obscuring methods. The detection of malicious software is the first step in system security. In this paper, a comprehensive review of the methods, such as deep learning, and datasets for cyber security intrusion are provided. Numer...
Article
Full-text available
Aiming at providing a high-performance terrestrial network for edge computing in satellite networks, we experimentally demonstrate a high bandwidth and low latency decomposed optical computing architecture based on distributed Nanoseconds Optical Switches (NOS). Experimental validation of the decomposed computing network prototype employs a four-po...
Article
Full-text available
This work presents P4TE, an in-band traffic monitoring, load-aware packet forwarding, and flow rate controlling mechanism for traffic engineering in fat-tree topology-based data center networks using PISA switches. It achieves sub-RTT reaction time to change in network conditions, improved flow completion time, and balanced link utilization. Unlike...
Preprint
Full-text available
Networked control systems are feedback control systems with system components distributed at different locations connected through a communication network. Since the communication network is carried out through the internet and there are bandwidth and packet size limitations, network constraints appear. Some of these constraints are time delay and...
Article
Full-text available
The proliferation of IoT applications has pushed the horizon of edge computing, which provides processing ability at the edge of networks. Task offloading is one of the most important issues in edge computing and has attracted continuous research attention in recent years. With task offloading, end devices can offload the entire task or only subtas...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) are increasingly being used in a high-computation paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless communication networks. These networks have an avenue for generating a considerable amount of heterogeneous data by the expanding number of Internet of Things (IoT) devices in smart...
Preprint
Full-text available
In this paper, we focus on the problem of data sharing over a wireless computer network (i.e., a wireless grid). Given a set of available data, we present a distributed algorithm which operates over a dynamically changing network, and allows each node to calculate the optimal allocation of data in a finite number of time steps. We show that our pro...
Article
Full-text available
Intrusion detection systems (IDSs) based on machine learning algorithms represent a key component for securing computer networks, where normal and abnormal behaviours of network traffic are automatically learned with no or limited domain experts’ interference. Most of existing IDS approaches rely on labeled predefined classes which require domain e...
Article
Full-text available
With the development of multimedia related technologies, smart education has entered a new stage. With the support of multimedia computer network education, education is no longer traditional school education, network education can be carried out through smart devices, and knowledge innovation and dissemination can be achieved through the huge teac...
Article
Full-text available
Edge Computing (EC), as tourism consumer decision data, is processed in a timely and effective manner in the source's vicinity and provides computing, network, and storage resources integrated platform. Therefore, it has become the Internet of Things (IoT) industry platform for Edge Computing (EC) in the tourism decision model. EC has unexpected se...
Article
Full-text available
In order to ensure the security of robot computer network information, a data encryption technology is proposed. Through the comprehensive research of symmetric cryptography algorithm, open cryptography algorithm, hybrid encryption algorithm, AES algorithm, quantum cryptography technology, and ECC algorithm, a data encryption method suitable for ro...
Article
Full-text available
Creativity is related to a higher flexible semantic memory structure, which could explain greater fluency of ideas. Extensive research has identified a positive connection between creativity and bi-/multilingualism mainly in contexts where two languages or more concur in daily communicative interactions. Yet, creativity has received scant attention...
Preprint
Full-text available
The lifestyle has evolved a lot in the last few years. Technological advancement in the field of embedded systems, computer networks, and the Internet of Things (IoT) has ameliorated our way of living. It has become an essential part of our lives. This paper describes the various aspects of a drone (quadcopter) controlled by the Internet of Things....
Article
Full-text available
The Internet is a new medium for disseminating information. The emergence of online information dissemination tools has overcome the limitations of time and space in the early information dissemination tools, and online information dissemination has extraordinary attractiveness in all walks of life. Online communication is the dissemination of info...
Book
Full-text available
The developments that make entire nations (rather than just a few individuals) rich are the pivotal developments of history. These developments have occurred both in the larger social structure and within the area of economic development (standard of living). The foundations of technological society are the following historical developments: specia...
Preprint
Full-text available
The rapid growth of technology has led to the creation of computing networks. The applications of the Internet of Things are becoming more and more visible with the expansion and development of sensors and the use of a series of equipment to connect to the Internet. Of course, the growth of any network will also provide some challenges. The main ch...
Conference Paper
Full-text available
Network security is becoming a critical issue due to the spread of computer networks to ordinary people. User authentication is one of the most important part for network security. Although passwords are used in many personal computers, it has many well-known problems and it is antiquated. On the other hand, fingerprint or face based authentication...