Showing 781 - 800 results of 809 for search '"Internet Protocol"', query time: 0.17s Refine Results
  1. 781

    Enriching students’ experience in logistics and transportation through simulation by Mohd Saifudin, Adam, Zainuddin, Nizamuddin, Bahaudin, Ahmad Yusni, Zalazilah, Mohd Hanizan, Jamaludin, Roslan

    Published 2015
    “…Student’s employability is crucial factor that brings development to all economy.The present study looked into simulation content development which is all about developing, enriching and the applications of internet protocols in order to enrich the work-related competencies experience among graduate in the field of logistics and transportations.The study was carried out within multi-national and local manufacturing companies, third party companies and government agency which are selected from Peninsular Malaysia.The sampling of the study focuses on undergraduate studying technology management and logistics and transportation in the public universities.A framework was proposed in the study that will cover the education through simulation in logistics and transportation.A qualitative approach was mainly conducted to gather data in the study.The findings assert that the resources involved in the outbound and inbound processes are computerized documentation.The study contributes to the body of knowledge on the enrichment of the student’s employability.It also provided a practical recommendation for the organizations, employees and fresh graduate from the universities.…”
    Get full text
    Article
  2. 782

    Students' employability opportunities through simulation in logistics and transportation by Mohd Saifudin, Adam, Zainuddin, Nizamuddin, Bahaudin, Ahmad Yusni, Zalazilah, Mohd Hanizan, Jamaludin, Roslan

    Published 2015
    “…Student’s employability is crucial factor that brings development to all economy.The present study looked into simulation content development which is all about developing, enriching and the applications of internet protocols in order to enrich the work-related competencies experience among graduate in the field of logistics and transportation'sThe study was carried out within multi-national and local manufacturing companies, third party companies and government agency which are selected from Peninsular Malaysia.The sampling of the study focuses on undergraduate studying technology management and logistics and transportation in the public universities.A framework was proposed in the study that will cover the education through simulation in logistics and transportation.A qualitative approach was mainly conducted to gather data in the study.The findings assert that the resources involved in the outbound and inbound processes are computerized documentation.The study contributes to the body of knowledge on the enrichment of the student’s employability.It also provided a practical recommendation for the organizations, employees and fresh graduate from the universities…”
    Get full text
    Article
  3. 783

    Optimization Task Scheduling Algorithm in Cloud Computing by Somayeh Taherian Dehkordi, Vahid Khatibi Bardsiri

    Published 2015-10-01
    “…<br />Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. …”
    Get full text
    Article
  4. 784

    Enriching Students' Experience in Logistics and Transportation through Simulation by Adam Mohd Saifudin, Nizamuddin Zainuddin, Ahmad Yusni Bahaudin, Mohd Hanizan Zalazilah, Roslan Jamaludin

    Published 2015-07-01
    “…The present study looked into simulation content development which is all about developing, enriching and the applications of internet protocols in order to enrich the work-related competencies experience among graduate in the field of logistics and transportations. …”
    Get full text
    Article
  5. 785

    Enriching Students' Experience in Logistics and Transportation through Simulation by Adam Mohd Saifudin, Nizamuddin Zainuddin, Ahmad Yusni Bahaudin, Mohd Hanizan Zalazilah, Roslan Jamaludin

    Published 2015-07-01
    “…The present study looked into simulation content development which is all about developing, enriching and the applications of internet protocols in order to enrich the work-related competencies experience among graduate in the field of logistics and transportations. …”
    Get full text
    Article
  6. 786

    Enriching Students' Experience in Logistics and Transportation through Simulation by Adam Mohd Saifudin, Nizamuddin Zainuddin, Ahmad Yusni Bahaudin, Mohd Hanizan Zalazilah, Roslan Jamaludin

    Published 2015-07-01
    “…The present study looked into simulation content development which is all about developing, enriching and the applications of internet protocols in order to enrich the work-related competencies experience among graduate in the field of logistics and transportations. …”
    Get full text
    Article
  7. 787

    TASA: A New Task Scheduling Algorithm in Cloud Computing by Somayeh Taherian Dehkordi, Vahid Khatibi Bardsiri

    Published 2015-11-01
    “…Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. It merges a lot of physical resources and offers them to users as services according to service level agreement. …”
    Get full text
    Article
  8. 788

    Web Services Integration Strategy with Minimum Hops Constraint in Wireless Sensor Networks by Wen Ouyang, Min-Lang Chen

    Published 2014-02-01
    “…However, web service is based on Internet protocols and requires adaptation to suit the restrictions posed by WSNs. …”
    Get full text
    Article
  9. 789

    Beyond the Business Case: Strategic IT Investment by Ross, Jeanne, Beath, Cynthia

    Published 2002
    “…Infrastructure costs were often bundled with applications, although disruptive technologies, such as desktop computing and Internet protocols, led to occasional large lump sum investments. …”
    Get full text
  10. 790

    Bit Flipping Key Encapsulation for the Post-Quantum Era by Mohammad Reza Nosouhi, Syed Wajid Ali Shah, Lei Pan, Robin Doss

    Published 2023-01-01
    “…It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today&#x2019;s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the National Institute of Standards and Technology (NIST) has recently reviewed and analyzed numerous approaches to PQC. …”
    Get full text
    Article
  11. 791

    Experimental Evaluation of Unicast and Multicast CoAP Group Communication by Isam Ishaq, Jeroen Hoebeke, Ingrid Moerman, Piet Demeester

    Published 2016-07-01
    “…These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. …”
    Get full text
    Article
  12. 792

    Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers by Lopes Raul H. C., Franqueira Virginia N. L., Rand Duncan

    Published 2019-01-01
    “…Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. …”
    Get full text
    Article
  13. 793

    Low-Power Wireless for the Internet of Things: Standards and Applications by Ali Nikoukar, Saleem Raza, Angelina Poole, Mesut Gunes, Behnam Dezfouli

    Published 2018-01-01
    “…The proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the <italic>Internet of Things</italic> (IoT) to bridge the gap between the virtual and physical world through enabling the monitoring and actuation of the physical world controlled by data processing systems. …”
    Get full text
    Article
  14. 794

    COMPARISON OF RED AND E-RED: A STABILIZING AQM SCHEME FOR CONGESTION CONTROL AND AVOIDANCE by T. Revathi, M.Sushmera

    Published 2010-06-01
    “…In today’s globally integrated Emerging technologies, the current Internet protocols uses packet-level mechanisms having end to end links to detect and react to congestion. …”
    Get full text
    Article
  15. 795

    Smart Node Networks Orchestration: A New E2E Approach for Analysis and Design for Agile 4.0 Implementation by Annalisa Bertoli, Andrea Cervo, Carlo Alberto Rosati, Cesare Fantuzzi

    Published 2021-02-01
    “…Our research topic mainly focuses on the area of data mining and analysis by means of multi-agent orchestration of intelligent sensor nodes using internet protocols, providing also web-based HMI visualizations for data interpretability and analysis. …”
    Get full text
    Article
  16. 796

    A Coloured Petri Net Approach to Formalising and Analysing the Resource Reservation Protocol by María E. Villapol, Jonathan Billington

    Published 2003-12-01
    “…RSVP attempts to provide performance guarantees by establishing resource reservations (such as the number of buffers and bandwidth allocation) within routers and host computers of the Internet. Currently, Internet protocols are not formally specified when they are developed. …”
    Get full text
    Article
  17. 797

    Analysis of factors affecting IoT-based smart hospital design by Banu Çalış Uslu, Ertuğ Okay, Erkan Dursun

    Published 2020-11-01
    “…IoT allows systems to work together using sensors, connection methods, internet protocols, databases, cloud computing, and analytic as infrastructure. …”
    Get full text
    Article
  18. 798

    A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period by Dawei Wei, Feifei Shi, Sahraoui Dhelim

    Published 2022-10-01
    “…The identification of Internet protocols provides a significant basis for keeping Internet security and improving Internet Quality of Service (QoS). …”
    Get full text
    Article
  19. 799

    USE OF INTELLEGENT AND BLOCK CHAIN TECHNOLOGIES IN INFORMATION MANAGEMENT Minsk Innovation University by U. A. Vishniakou

    Published 2018-06-01
    “…Technically, the block chain technology is another application layer on top of the stack of the Internet protocols and can be integrated with the semantic level. …”
    Get full text
    Article
  20. 800

    أمن الشبكات الحاسوبية في الاتصالات المرئية by تاج الدين جركس, عدنان معترماوي, رامي سلطان

    Published 2019-01-01
    “…This research studies video over internet protocols, which are becoming more common. More networks and legacy systems are being connected to public networks, allowing organizations to reduce costs and improve their offerings while allowing users to enjoy a variety of new and advanced services. …”
    Get full text
    Article