[HTML][HTML] Maintaining Cyber Resilience in the Reconfigurable Networks with Immunization and Improved Network Game Methods
The paper proposes a technique for protecting reconfigurable networks that implements
topology rebuilding, which combines immunization and network gaming methods, as a …
topology rebuilding, which combines immunization and network gaming methods, as a …
Internet of things driven multilinear regression technique for fertilizer recommendation for precision agriculture
Food instability has been linked to infertility, health issues, accelerated aging, incorrect
insulin regulation, and more. Innovative approaches increased food availability and quality …
insulin regulation, and more. Innovative approaches increased food availability and quality …
Analisis dan Pengembangan Jaringan Komputer di SMK Negeri 8 Weda Halmahera Tengah
DD Papaceda, A Mewengkang… - … Teknologi Informasi dan …, 2023 - ejurnal.unima.ac.id
Jaringan komputer adalah sebuah system yang terdiri dari beberapa komponen komputer
dan device yang saling berhubungan melalui transmisi kabel atau wireless. Adapun tujuan …
dan device yang saling berhubungan melalui transmisi kabel atau wireless. Adapun tujuan …
Development of IoT based intelligent irrigation system using particle swarm optimization and XGBoost techniques
A crop needs regular watering throughout its life to grow well. Irrigation improves food
growth. Machines irrigate plants. The dry Sahel, which gets a lot of rain during the summer …
growth. Machines irrigate plants. The dry Sahel, which gets a lot of rain during the summer …
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique
P Golda Jeyasheeli, V Nahshon Vanahpeter… - Wireless …, 2024 - Springer
With the basic principle of separating control and data planes, software defined networking
(SDN) has emerged as a promising paradigm. The separation generates a variety of scaling …
(SDN) has emerged as a promising paradigm. The separation generates a variety of scaling …
A review on network function virtualisation security challenges and design considerations
N Ahmad, MS Rathore… - International Journal of …, 2024 - inderscienceonline.com
Network function virtualisation (NFV) offers several benefits to both network operators and
end users. It is a more programmable and low-cost solution as compared to a traditional …
end users. It is a more programmable and low-cost solution as compared to a traditional …
[PDF][PDF] A comprehensive survey of performance, security and privacy issues in the network interface layer of the TCP/IP
E Asituha - GSC Advanced Research and Reviews, 2024 - pdfs.semanticscholar.org
The network interface layer of the TCP/IP protocol suite, primarily comprised of the Internet
Protocol (IP), serves as the backbone of modern internet communication. With its efficient …
Protocol (IP), serves as the backbone of modern internet communication. With its efficient …
Lightweight deep learning model for task scheduling in Resource Constrained Internet of Things
D Singh, SK Joshi - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
Regarding the trade in computation time and optimisation in each task scheduling, it is
challenging for a single scheduling method to achieve the optimal scheduler optimisation …
challenging for a single scheduling method to achieve the optimal scheduler optimisation …
НАУКА И БИЗНЕС: ПУТИ РАЗВИТИЯ
АА ТЮТЮННИК, ТВ КАКАТУНОВА, ДА ТЮКАЕВ… - НАУКА И БИЗНЕС: ПУТИ … - elibrary.ru
В настоящее время проблемы обеспечения информационной безопасности, в
частности проблема защиты персональных и коммерческих данных при их передаче …
частности проблема защиты персональных и коммерческих данных при их передаче …