network development
Recently Published Documents


TOTAL DOCUMENTS

839
(FIVE YEARS 234)

H-INDEX

38
(FIVE YEARS 4)

2022 ◽  
Author(s):  
Raoudha Saida ◽  
Yessine Hadj Kacem ◽  
Mohammed S. BenSaleh ◽  
Mohamed Abid

2022 ◽  
pp. 462-487

Globally, adults engage in various forms of high-investment adventure play in their leisure. Sometimes, these are complementary to their careers, their self-identities, and their social circles. This type of adventure play requires investments in learning, KSA (knowledge, skills, and abilities) development, social network development, time, moneys, reputation, and other costs. It may involve some level of risk-taking. This work explores this niche space of “hard” adventure play as expressed on the Social Web as a type of peer-shared teaching and learning, with a focus on “luxury geocaching” as the activity.


2021 ◽  
Vol 4 (3) ◽  
pp. 329-337
Author(s):  
Dora Sandova ◽  
Cahyo Prihantoro

Jaringan komputer maupun jaringan internet saat ini memiliki peranan penting dalam menjalankan kegiatan sehari-hari, baik dilakukan dalam proses belajar-mengajar, pekerjaan, maupun aktivitas masyarakat. Kendala yang dihadapi salah satunya adalah terkait lalu lintas data yang nantinya akan berkaitan erat dengan kecepatan akses internet. Oleh sebab itu penelitian ini dilakukan untuk menganalisis lalu lintas data (traffic) yang ada dan menemukan pengaturan terbaik untuk mendapatkan hasil yang maksimal dan merata menggunakan perangkat Router Mikrotik. Menggunakan metode pengembangan system NDLC (Network Development Life Cycle). NDLC merupakan model yang mendefinisikan siklus proses perancangan atau pengembangan suatu system jaringan komputer dimana mempunyai elemen yang mendefinisikan fase, tahapan, langkah atau mekanisme proses spesifik. Kesimpulan yang dapat diambil dari evaluasi sistem jaringan ini adalah; Semua Jaringan komputer kabel dapat dimanajemen dengan mikrotik, Pembagian Bandwidth internet dengan mikrotik memberikan efisiensi pemakaian bandwidth internet, Sistem keamanan jaringan yang diberikan oleh mikrotik dapat terfasilitasi dengan baik. Dengan adanya mikrotik, maka dapat diketahui jika adanya PC yang tidak dapat melakukan koneksi atau sedang down. Hasil analisis menunjukkan angka Max in: 675.62 Kb, Average in: 127.08 Kb, Current in: 66.68 Kb, Max Out: 173.88 Kb, Average Out: 24.88 Kb, Current Out: 14.78 Kb.


Device ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. 13-20
Author(s):  
Dedy Ronald Saragi ◽  
Sumarno Sumarno ◽  
Zulaini Masruro Nasution ◽  
Iin Parlina ◽  
Fitri Anggraini

Kebutuhan akses internet saat ini sangat tinggi, baik itu untuk mencari informasi terbaru, Menginplementasikan layanan internet sebagai alat mencari informasi. Dalam akses hotspot terdapat berbagai macam kondisi pengguna, sehingga menimbulkan permasalahan antara lain management bandwidth dan network management tools. Oleh karena itu timbul solusi dengan menggunakan mikrotik sebagai router, mikrotik mudah dioperasikan karena menggunakan winbox dalam tampilan GUI. Metode pengembangan sistem yang penulis gunakan yaitu metode Network Development Life Cycle (NDLC) karena mencakup tahap Analisis, Implementasi, Monitoring dan Managemen.


Author(s):  
Nazmul Hossain ◽  
Md Zobayer Hossain ◽  
Md Alam Hossain

The IoT (Internet of Things) is now a trendy technology with its numerous apps in multiple areas. It includes a heterogeneous amount of Internet and mutually linked devices. Since the IoT network is characterized by tiny assets that produce less energy and are more flexible, this number of machines is difficult to monitor. SDN (Software Defined Network) is a new network model that facilitates the creation and introduction of fresh networking abstractions, simplifies the management of network and facilitates network development. In this paper, by leveraging the fundamental characteristics represented by Software Defined Networks (SDN), we present an ontological security architecture for IoT networks. Our security architecture restricts access to independently verified IoT devices via the network. To secure the flows in the IoT network infrastructure, we introduced an extra layer and provide a lightweight protocol to authenticate IoT systems. Such an advanced strategy to protection containing IoT device authentication and allowing approved flows can assist secure IoT networks against malicious IoT devices and threats.


Author(s):  
Jessica McBeck ◽  
J. M. Aiken ◽  
B. Cordonnier ◽  
Y. Ben-Zion ◽  
F. Renard

AbstractThe geometric properties of fractures influence whether they propagate, arrest, or coalesce with other fractures. Thus, quantifying the relationship between fracture network characteristics may help predict fracture network development, and perhaps precursors to catastrophic failure. To constrain the relationship and predictability of fracture characteristics, we deform eight one centimeter tall rock cores under triaxial compression while acquiring in situ X-ray tomograms. The tomograms reveal precise measurements of the fracture network characteristics above the spatial resolution of 6.5 µm. We develop machine learning models to predict the value of each characteristic using the other characteristics, and excluding the macroscopic stress or strain imposed on the rock. The models predict fracture development more accurately in the experiments performed on granite and monzonite, than the experiments on marble. Fracture network development may be more predictable in these igneous rocks because their microstructure is more mechanically homogeneous than the marble, producing more systematic fracture development that is not strongly impeded by grain contacts and cleavage planes. The varying performance of the models suggest that fracture volume, length, and aperture are the most predictable of the characteristics, while fracture orientation is the least predictable. Orientation does not correlate with length, as suggested by the idea that the orientation evolves with increasing differential stress and thus fracture length. This difference between the observed and expected relationship between orientation and length highlights the influence of mechanical heterogeneities and local stress perturbations on fracture growth as fractures propagate, link, and coalesce.


Sign in / Sign up

Export Citation Format

Share Document