Results for 'computer network'

1000+ found
Order:
  1. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2.  7
    Towards a computational network theory of social groups.Daniel Redhead, Riana Minocher & Dominik Deffner - 2022 - Behavioral and Brain Sciences 45.
    Network theory is necessary for the realization of cognitive representations and resulting empirical observations of social groups. We propose that the triadic primitives denoting individual roles are multilayer, with positive and negative relations feeding into cost–benefit calculations. Through this, we advance a computational theory that generalizes to different scales and to contexts where conflict is not present.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  11
    Attack scenario graphs for computer network threat analysis and prediction.Todd Hughes & Oleg Sheyner - 2003 - Complexity 9 (2):15-18.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. More broadly, computer networks have made interaction between.Cultures In Collision - 2002 - In James Moor & Terrell Ward Bynum (eds.), Cyberphilosophy: the intersection of philosophy and computing. Malden, MA: Blackwell.
  5. Some Useful 16-Valued Logics: How a Computer Network Should Think.Yaroslav Shramko & Heinrich Wansing - 2005 - Journal of Philosophical Logic 34 (2):121-153.
    In Belnap's useful 4-valued logic, the set 2 = {T, F} of classical truth values is generalized to the set 4 = ������(2) = {Ø, {T}, {F}, {T, F}}. In the present paper, we argue in favor of extending this process to the set 16 = ᵍ (4) (and beyond). It turns out that this generalization is well-motivated and leads from the bilattice FOUR₂ with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN₃ with an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  6.  28
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  8
    The Information Web: Ethical and Social Implications of Computer Networking.Carol C. Gould (ed.) - 1989 - Routledge.
    This book deals with the major ethical and social implications of computer networking and its technological development. In this book, a number of leading thinkers--philosophers, computer scientists and researchers--address some fundamental questions posed by the new technology.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  7
    Research on the teaching innovation model of undergraduate musical ecology course under computer network environment.Bo Wang - 2022 - Educational Philosophy and Theory 54 (7):992-1002.
    Education ecology is a new crossover research field in network age. Its research content can be either microscopic classroom teaching or macro educational ecology research on teaching and culture. The university music classroom is a special kind of ecology. The reason why this is special is that compared to natural ecology, the classroom ecology of university music has a unique relationship between the environment and the subject. The classroom is ecological and becomes the logical prerequisite for ecological research in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  8
    Resilient and adaptive defense of computing networks.Robert Ghanea-Hercock - 2003 - Complexity 9 (2):13-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  5
    Emergent computation: Self-organizing, collective, and cooperative phenomena in natural and artificial computing networks.Peter M. Todd - 1993 - Artificial Intelligence 60 (1):171-183.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Carol Gould, ed., The Information Web: Ethical and Social Implications of Computer Networking Reviewed by.Kristin Shrader-Frechette - 1990 - Philosophy in Review 10 (3):110-112.
     
    Export citation  
     
    Bookmark  
  13.  16
    The Computational Challenges of Means Selection Problems: Network Structure of Goal Systems Predicts Human Performance.Daniel Reichman, Falk Lieder, David D. Bourgin, Nimrod Talmon & Thomas L. Griffiths - 2023 - Cognitive Science 47 (8):e13330.
    We study human performance in two classical NP‐hard optimization problems: Set Cover and Maximum Coverage. We suggest that Set Cover and Max Coverage are related to means selection problems that arise in human problem‐solving and in pursuing multiple goals: The relationship between goals and means is expressed as a bipartite graph where edges between means and goals indicate which means can be used to achieve which goals. While these problems are believed to be computationally intractable in general, they become more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  35
    Computing Nature–A Network of Networks of Concurrent Information Processes.Gordana Dodig-Crnkovic & Raffaela Giovagnoli - 2013 - In Gordana Dodig-Crnkovic Raffaela Giovagnoli (ed.), Computing Nature. pp. 1--22.
    This text presents the research field of natural/unconventional computing as it appears in the book COMPUTING NATURE. The articles discussed consist a selection of works from the Symposium on Natural Computing at AISB-IACAP (British Society for the Study of Artificial Intelligence and the Simulation of Behaviour and The International Association for Computing and Philosophy) World Congress 2012, held at the University of Birmingham, celebrating Turing centenary. The COMPUTING NATURE is about nature considered as the totality of physical existence, the universe. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  19
    The computational complexity of probabilistic inference using bayesian belief networks.Gregory F. Cooper - 1990 - Artificial Intelligence 42 (2-3):393-405.
  16.  10
    Diana Hook;, Jeremy Norman. Origins of Cyberspace: A Library on the History of Computing, Networking, and Telecommunications. x + 670 pp., illus., index. Novato, Calif.: Norman Publishing, 2002. $500. [REVIEW]Michael S. Mahoney - 2004 - Isis 95 (4):723-724.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  9
    Origins of Cyberspace: A Library on the History of Computing, Networking, and Telecommunications. [REVIEW]Michael Mahoney - 2004 - Isis 95:723-724.
  18.  57
    On Computation of Entropy of Hex-Derived Network.Pingping Song, Haidar Ali, Muhammad Ahsan Binyamin, Bilal Ali & Jia-Bao Liu - 2021 - Complexity 2021:1-18.
    A graph’s entropy is a functional one, based on both the graph itself and the distribution of probability on its vertex set. In the theory of information, graph entropy has its origins. Hex-derived networks have a variety of important applications in medication store, hardware, and system administration. In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1 n and HDN 2 n, respectively of order n. We also compute some degree-based entropies such as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  70
    Moving beyond content‐specific computation in artificial neural networks.Nicholas Shea - 2021 - Mind and Language 38 (1):156-177.
    A basic deep neural network (DNN) is trained to exhibit a large set of input–output dispositions. While being a good model of the way humans perform some tasks automatically, without deliberative reasoning, more is needed to approach human‐like artificial intelligence. Analysing recent additions brings to light a distinction between two fundamentally different styles of computation: content‐specific and non‐content‐specific computation (as first defined here). For example, deep episodic RL networks draw on both. So does human conceptual reasoning. Combining the two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  36
    Universal computation in fluid neural networks.Ricard V. Solé & Jordi Delgado - 1996 - Complexity 2 (2):49-56.
    Fluid neural networks can be used as a theoretical framework for a wide range of complex systems as social insects. In this article we show that collective logical gates can be built in such a way that complex computation can be possible by means of the interplay between local interactions and the collective creation of a global field. This is exemplified by a NOR gate. Some general implications for ant societies are outlined. ©.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  11
    Computation of the Complexity of Networks under Generalized Operations.Hafiz Usman Afzal, Muhammad Javaid, Ali Ovais & Md Nur Alam - 2022 - Complexity 2022:1-20.
    The connected and acyclic components contained in a network are identified by the computation of its complexity, where complexity of a network refers to the total number of spanning trees present within. The article in hand deals with the enumeration of the complexity of various networks’ operations such as sum, product, difference K 2, n ⊖ K 2, and the conjunction of S n with K 2. All our computations have been concluded by implementation of the methods of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  33
    A Network is a Network is a Network: Reflections on the Computational and the Societies of Control.David M. Berry & Alexander R. Galloway - 2016 - Theory, Culture and Society 33 (4):151-172.
    In this wide-ranging conversation, Berry and Galloway explore the implications of undertaking media theoretical work for critiquing the digital in a time when networks proliferate and, as Galloway claims, we need to ‘forget Deleuze’. Through the lens of Galloway’s new book, Laruelle: Against the Digital, the potential of a ‘non-philosophy’ for media is probed. From the import of the allegorical method from excommunication to the question of networks, they discuss Galloway’s recent work and reflect on the implications of computation for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Some Neural Networks Compute, Others Don't.Gualtiero Piccinini - 2008 - Neural Networks 21 (2-3):311-321.
    I address whether neural networks perform computations in the sense of computability theory and computer science. I explicate and defend
    the following theses. (1) Many neural networks compute—they perform computations. (2) Some neural networks compute in a classical way.
    Ordinary digital computers, which are very large networks of logic gates, belong in this class of neural networks. (3) Other neural networks
    compute in a non-classical way. (4) Yet other neural networks do not perform computations. Brains may well fall into this last class.
     
    Export citation  
     
    Bookmark   17 citations  
  24.  29
    A Computational Model for the Item‐Based Induction of Construction Networks.Judith Gaspers & Philipp Cimiano - 2014 - Cognitive Science 38 (3):439-488.
    According to usage‐based approaches to language acquisition, linguistic knowledge is represented in the form of constructions—form‐meaning pairings—at multiple levels of abstraction and complexity. The emergence of syntactic knowledge is assumed to be a result of the gradual abstraction of lexically specific and item‐based linguistic knowledge. In this article, we explore how the gradual emergence of a network consisting of constructions at varying degrees of complexity can be modeled computationally. Linguistic knowledge is learned by observing natural language utterances in an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  31
    The Computational and Experimental Complexity of Gene Perturbations for Regulatory Network Search.David Danks, Clark Glymour & Peter Spirtes - 2003 - In W. H. Hsu, R. Joehanes & C. D. Page (eds.), Proceedings of IJCAI-2003 workshop on learning graphical models for computational genomics.
    Various algorithms have been proposed for learning (partial) genetic regulatory networks through systematic measurements of differential expression in wild type versus strains in which expression of specific genes has been suppressed or enhanced, as well as for determining the most informative next experiment in a sequence. While the behavior of these algorithms has been investigated for toy examples, the full computational complexity of the problem has not received sufficient attention. We show that finding the true regulatory network requires (in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  10
    Social.networks@work: Case studies into the importance of computer-supported social networks in a mobile phone company.Gerit Götzenbrucker - 2004 - Communications 29 (4):467-494.
    Organizational innovation depends heavily on whether or not communication processes are regulated. Furthermore, social networks represent content-based connectivity of actors in opposition to formal organization. Communication technologies such as e-mail make it possible to continuously maintain the establishment and preserve social networks. Enhancing cooperation in team working processes are the benefits of social networks in dynamic organizations. This article reports on four case studies which focused on teamwork and the structural analysis of e-mail as a communication technology in a mobile (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  53
    The application of neural network algorithm and embedded system in computer distance teach system.Qin Qiu - 2022 - Journal of Intelligent Systems 31 (1):148-158.
    The computer distance teaching system teaches through the network, and there is no entrance threshold. Any student who is willing to study can log in to the network computer distance teaching system for study at any free time. Neural network has a strong self-learning ability and is an important part of artificial intelligence research. Based on this study, a neural network-embedded architecture based on shared memory and bus structure is proposed. By looking for an (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  4
    A Computational Turn in Policy Process Studies: Coevolving Network Dynamics of Policy Change.Maxime Stauffer, Isaak Mengesha, Konrad Seifert, Igor Krawczuk, Jens Fischer & Giovanna Di Marzo Serugendo - 2022 - Complexity 2022:1-17.
    The past three decades of policy process studies have seen the emergence of a clear intellectual lineage with regard to complexity. Implicitly or explicitly, scholars have employed complexity theory to examine the intricate dynamics of collective action in political contexts. However, the methodological counterparts to complexity theory, such as computational methods, are rarely used and, even if they are, they are often detached from established policy process theory. Building on a critical review of the application of complexity theory to policy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  18
    On Computing Structural and Behavioral Complexities of Threshold Boolean Networks: Application to Biological Networks.Urvan Christen, Sergiu Ivanov, Rémi Segretain, Laurent Trilling & Nicolas Glade - 2019 - Acta Biotheoretica 68 (1):119-138.
    Various threshold Boolean networks, a formalism used to model different types of biological networks, can produce similar dynamics, i.e. share same behaviors. Among them, some are complex, others not. By computing both structural and behavioral complexities, we show that most TBNs are structurally complex, even those having simple behaviors. For this purpose, we developed a new method to compute the structural complexity of a TBN based on estimates of the sizes of equivalence classes of the threshold Boolean functions composing the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Computational Intelligence Part II Lecture 1: Identification Using Neural Networks.Farzaneh Abdollahi - 2009 - In L. Magnani (ed.), Computational Intelligence.
  31.  27
    Enchanted Looms: Conscious Networks in Brains and Computers.Rodney Cotterill - 1998 - Cambridge University Press.
    The title of this book was inspired by a passage in Charles Sherrington's Man on his Nature.
    Direct download  
     
    Export citation  
     
    Bookmark   27 citations  
  32.  12
    Computing Some Degree-Based Topological Indices of Honeycomb Networks.Lili Gu, Shamaila Yousaf, Akhlaq Ahmad Bhatti, Peng Xu & Adnan Aslam - 2022 - Complexity 2022:1-13.
    A topological index is a numeric quantity related with the chemical composition claiming to correlate the chemical structure with different chemical properties. Topological indices serve to predict physicochemical properties of chemical substance. Among different topological indices, degree-based topological indices would be helpful in investigating the anti-inflammatory activities of certain chemical networks. In the current study, we determine the neighborhood second Zagreb index and the first extended first-order connectivity index for oxide network O X n, silicate network S L (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  6
    Neural Network-Based Intelligent Computing Algorithms for Discrete-Time Optimal Control with the Application to a Cyberphysical Power System.Feng Jiang, Kai Zhang, Jinjing Hu & Shunjiang Wang - 2021 - Complexity 2021:1-10.
    Adaptive dynamic programming, which belongs to the field of computational intelligence, is a powerful tool to address optimal control problems. To overcome the bottleneck of solving Hamilton–Jacobi–Bellman equations, several state-of-the-art ADP approaches are reviewed in this paper. First, two model-based offline iterative ADP methods including policy iteration and value iteration are given, and their respective advantages and shortcomings are discussed in detail. Second, the multistep heuristic dynamic programming method is introduced, which avoids the requirement of initial admissible control and achieves (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  25
    Network stabilization on unstable manifolds: Computing with middle layer transients.Arnold J. Mandell & Karen A. Selz - 2001 - Behavioral and Brain Sciences 24 (5):822-823.
    Studies have failed to yield definitive evidence for the existence and/or role of well-defined chaotic attractors in real brain systems. Tsuda's transients stabilized on unstable manifolds of unstable fixed points using mechanisms similar to Ott's algorithmic “control of chaos” are demonstrable. Grebogi's order in preserving “strange nonchaotic” attractor with fractal dimension but Lyapounov is suggested for neural network tasks dependent on sequence.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  35.  34
    The computational and experimental complexity of Gene perturbations for regulatory network search.Clark Glymour - unknown
    Our primary interest is in determining how many gene perturbation experiments are required to determine the Various algorithms have been proposed for learning..
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  17
    Sensor networks and distributed CSP: communication, computation and complexity.Ramón Béjar, Carmel Domshlak, Cèsar Fernández, Carla Gomes, Bhaskar Krishnamachari, Bart Selman & Magda Valls - 2005 - Artificial Intelligence 161 (1-2):117-147.
  37. How do connectionist networks compute?Gerard O'Brien & Jonathan Opie - 2006 - Cognitive Processing 7 (1):30-41.
    Although connectionism is advocated by its proponents as an alternative to the classical computational theory of mind, doubts persist about its _computational_ credentials. Our aim is to dispel these doubts by explaining how connectionist networks compute. We first develop a generic account of computation—no easy task, because computation, like almost every other foundational concept in cognitive science, has resisted canonical definition. We opt for a characterisation that does justice to the explanatory role of computation in cognitive science. Next we examine (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  38. Intelligent Computing in Bioinformatics-An Efficient Attribute Ordering Optimization in Bayesian Networks for Prognostic Modeling of the Metabolic Syndrome.Han-Saem Park & Sung-Bae Cho - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4115--381.
  39.  8
    Computing leximin-optimal solutions in constraint networks.Sylvain Bouveret & Michel Lemaître - 2009 - Artificial Intelligence 173 (2):343-364.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  15
    Neural networks and computational theory: Solving the right problem.David C. Plaut - 1989 - Behavioral and Brain Sciences 12 (3):411-413.
  41. Intelligent Computing in Bioinformatics-Genetic Algorithm and Neural Network Based Classification in Microarray Data Analysis with Biological Validity Assessment.Vitoantonio Bevilacqua, Giuseppe Mastronardi & Filippo Menolascina - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4115--475.
     
    Export citation  
     
    Bookmark  
  42.  19
    Reliable computation in parallel networks.Keith Oatley - 1985 - Behavioral and Brain Sciences 8 (2):299-299.
  43.  8
    Networked bubble propagation: a polynomial-time hypothetical reasoning method for computing near-optimal solutions.Yukio Ohsawa & Mitsuru Ishizuka - 1997 - Artificial Intelligence 91 (1):131-154.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  24
    Syntactic Computations in the Language Network: Characterizing Dynamic Network Properties Using Representational Similarity Analysis.Lorraine K. Tyler, Teresa P. L. Cheung, Barry J. Devereux & Alex Clarke - 2013 - Frontiers in Psychology 4.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45.  11
    Network relaxation as biological computation.Hon C. Kwan, Tet H. Yeap, Donald Barrett & Bai C. Jiang - 1991 - Behavioral and Brain Sciences 14 (2):354-356.
  46.  10
    Entrepreneurship education-infiltrated computer-aided instruction system for college Music Majors using convolutional neural network.Hong Cao - 2022 - Frontiers in Psychology 13.
    The purpose is to improve the teaching and learning efficiency of college Innovation and Entrepreneurship Education. Firstly, from the perspective of aesthetic education, this work designs the teacher and student sides of the Computer-aided Instruction system. Secondly, the CAI model is implemented based on the weight sharing and local perception of the Convolutional Neural Network. Finally, the performance of the CNN-based CAI model is tested. Meanwhile, it analyses students’ IEE experience under the proposed CAI model through a case (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  19
    “Grandmother networks” and computational economy.J. J. Hopfield - 1986 - Behavioral and Brain Sciences 9 (1):100-100.
  48. Computational Finance and Business Intelligence-Comparisons of the Different Frequencies of Input Data for Neural Networks in Foreign Exchange Rates Forecasting.Wei Huang, Lean Yu, Shouyang Wang, Yukun Bao & Lin Wang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 517-524.
  49. Natural Computation Techniques Applications-Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.Ming Li & Huamin Feng - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4222--448.
    No categories
     
    Export citation  
     
    Bookmark  
  50.  30
    Computability of Logical Neural Networks.T. B. Ludermir - 1992 - Journal of Intelligent Systems 2 (1-4):261-290.
1 — 50 / 1000