|
|
|
Nazre bin Abdul Rashid,Md. Zahar bin Othman,Rasyidi bin Johan,Salman Firdaus bin Hj. Sidek
Pág. pp. 4 - 18
The Computer Networking course commonly taught in mixed mode involving lecture and practical session whereas beside face-to-face theory session, students need to experience hands-on activities in order to appreciate the technology and contents. Neverthel...
ver más
|
|
|
|
|
|
|
Darius Plikynas, Audrius Indriulionis, Algirdas Laukaitis and Leonidas Sakalauskas
This paper presents an approach to enhance electronic traveling aids (ETAs) for people who are blind and severely visually impaired (BSVI) using indoor orientation and guided navigation by employing social outsourcing of indoor route mapping and assistan...
ver más
|
|
|
|
|
|
|
István Pelle and András Gulyás
Designing, implementing, and maintaining network policies that protect from internal and external threats is a highly non-trivial task. Often, troubleshooting networks consisting of diverse entities realizing complex policies is even harder. Software-def...
ver más
|
|
|
|
|
|
|
Rudi Haryadi,Ade Gafar Abdullah10.17509/invotec.v11i2.2148 Abstract views: 383 PDF downloads: 252
Learning of vocational school learning should be able to prepare students who have qualified skills to fit the demands of the realistic activity of industry. Professional activities within the workplace should be integrated completed the learning process...
ver más
|
|
|
|
|
|
|
Eliel Melon, Yair Levy, Laurie P. Dringus
Pág. 62 - 81
While the Internet is a major business tool nowadays, individuals are still challenged to form teams and collaboration virtually. To evaluate the success of team formation in a virtual setting, this research study assessed the role of different computer-...
ver más
|
|
|
|
|
|
|
Aristotelis Glentis, Anastasios Panopoulos, Ilias Kapareliotis
Security is coming more and more in the spotlight of todays news. Several reasons have lead to this, like the maturity of computer technology, which gave access to more people to computer systems, and the evolution of the internet and computer networking...
ver más
|
|
|
|
|
|
|
Binita Kusum Dhamala, Babu R. Dawadi, Pietro Manzoni and Baikuntha Kumar Acharya
Graph representation is recognized as an efficient method for modeling networks, precisely illustrating intricate, dynamic interactions within various entities of networks by representing entities as nodes and their relationships as edges. Leveraging the...
ver más
|
|
|
|
|
|
|
Deepaa Selva, Balakrishnan Nagaraj, Danil Pelusi, Rajendran Arunkumar and Ajay Nair
Rapid Internet use growth and applications of diverse military have managed researchers to develop smart systems to help applications and users achieve the facilities through the provision of required service quality in networks. Any smart technologies o...
ver más
|
|
|
|
|
|
|
Francesco Contu, Andrea Demontis, Stefano Dessì, Marco Muscas and Daniele Riboni
Thanks to the popularity of personal mobile devices, more and more of the different types of private content, such as images and videos, are shared on social networking applications. While content sharing may be an effective practice to enhance social re...
ver más
|
|
|
|
|
|
|
Marco Peterson, Minzhen Du, Bryant Springle and Jonathan Black
The proliferation of reusable space vehicles has fundamentally changed how assets are injected into the low earth orbit and beyond, increasing both the reliability and frequency of launches. Consequently, it has led to the rapid development and adoption ...
ver más
|
|
|
|
|
|
|
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev...
ver más
|
|
|
|
|
|
|
Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Byrav Ramamurthy and Avishek Nag
In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in the US...
ver más
|
|
|
|
|
|
|
Spyridon Garmpis, Manolis Maragoudakis and Aristogiannis Garmpis
The plethora of changes that have taken place in policy formulations on higher education in recent years in Greece has led to unification, the abolition of departments or technological educational institutions (TEI) and mergers at universities. As a resu...
ver más
|
|
|
|
|
|
|
Martin Kenyeres and Jozef Kenyeres
Determining the network size is a critical process in numerous areas (e.g., computer science, logistic, epidemiology, social networking services, mathematical modeling, demography, etc.). However, many modern real-world systems are so extensive that meas...
ver más
|
|
|
|
|
|
|
Elias Munapo
Pág. 6 - 10
The paper presents a new method for solving the 0?1 linear programming problems (LPs). The general 0?1 LPs are believed to be NP-hard and a consistent, efficient general-purpose algorithm for these models has not been found so far. Cutting planes an...
ver más
|
|
|
|
|
|
|
Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan and Ian McAndrew
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home senso...
ver más
|
|
|
|
|
|
|
Pavani V L
Pág. pp. 4 - 19
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percep...
ver más
|
|
|
|
|
|
|
Nik nadian nisa Nik nazli,Sapora Sipon,Norita Md Norwawi
Pág. pp. 12 - 16
Smartphones are used in a variety of activities, including social networking, messaging, connectivity and context-sensitive applications. The ubiquities of handheld computer technology have been found to be very useful, especially in flood training appli...
ver más
|
|
|
|