Xem 1-20 trên 496 kết quả Function network
  • Radial-basis function (RBF) networks RBF = radial-basis function: là hàm phụ thuộc vào khỏang cách gốc từ một vector. RBFs là các hàm có dạng như trong hình Với f là hàm activation phi tuyến, x là các đầu vào và ti là vị trí thứ i, mẫu đầu tiên, vector cơ sở hoặc vector trung tâm. Điều này chỉ ra các điểm gần tâm sẽ có đầu ra tương tự nhau

    ppt39p haiph37 15-09-2010 109 48   Download

  • Network management is the poor cousin of network design and implementation. All too often it is treated as an inconvenience by equipment manufacturers, or forgotten entirely. But the ability to manage network devices is fundamental to their utility, and a successful and functional network can only be built from equipment that can be easily managed and operated. Management refers to the ability to confi gure, control, operate, and diagnose equipment. Of course, no vendor ships devices that cannot be managed, but typically each is operated and controlled in a different way.

    pdf401p member2087 05-03-2013 80 42   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Efficient reengineering of meso-scale topologies for functional networks in biomedical applications Andreas A Schuppert

    pdf20p dauphong12 08-02-2012 19 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Nonlinear Image Restoration Using a Radial Basis Function Network

    pdf10p sting12 11-03-2012 12 2   Download

  • Perl provides direct access to the C library routines for socket communication. Often, arguments and return values are constants defined in the C header files, or are data structures which Perl will pass in a packed binary format. The Socket module provides these constants and also many functions for packing and unpacking these data structures

    pdf79p duypha 07-08-2009 299 107   Download

  • Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

    pdf267p thutrang 17-08-2009 173 85   Download

  • Tham khảo tài liệu 'vb .net functions and statements', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf57p thuyvan 12-08-2009 192 60   Download

  • The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.

    pdf11p huyhoang 06-08-2009 133 52   Download

  • This Solution Reference Network Design (SRND) publication is intended to provide a set of guidelines for designing, implementing, and deploying Voice and Video Enabled IPSec VPN (V3 PN) solutions. This SRND defines the comprehensive functional components required to build a Site-to-Site Enterprise Virtual Private Network (VPN) solution that can transport IP telephony and video.

    pdf160p duypha 11-08-2009 167 45   Download

  • Your role as a Cisco Certified Design Associate is to be a network design consultant. You will act like an architect, building comprehensive designs that solve your customer's internetworking problems and provide the required functionality, performance, and scalability. In the same way that an architect designs a building or house for a client, you will develop blueprints for an overall internetwork design, as well as components plans for various pieces of the internetwork.

    pdf496p maiphuong 10-08-2009 131 44   Download

  • Describe the structure of a network, including the devices and media that are necessary for successful communications. Explain the function of protocols in network communications. Explain the advantages of using a layered model to describe network functionality. Describe the role of each layer in two recognized network models: The TCP/IP model and the OSI model. Describe the importance of addressing and naming schemes in network communications.

    pdf54p thangvu89 15-04-2010 133 32   Download

  • Communicating Over the Network. In this course, we focus on these aspects of the information network: Devices that make up the network, Media that connect the devices, Messages that are carried across the network, Rules and processes that govern network communications, Tools and commands for constructing and maintaining networks.

    pdf39p thanhtung_hk 03-11-2010 94 28   Download

  • OSI Transport Layer. In this chapter, we examine the role of the Transport layer. The Transport layer also encompasses these functions: Enables multiple applications to communicate over the network at the same time on a single device. Ensures that, if required, all the data is received reliably and in order by the correct application. Employs error handling mechanisms. Learning Objectives–Upon completion of this chapter, you will be able to: Explain the need for the Transport layer.

    pdf47p thanhtung_hk 03-11-2010 84 26   Download

  • This lab will help to develop a better understanding of the seven layers of the OSI model. Specifically as they relate to the most popular functioning networking model in existence, the TCP/IP model. The Internet is based on TCP/IP. TCP/IP has become the standard language of networking. However, the seven layers of the OSI model are the ones most commonly used to describe and compare networking software and hardware from various vendors. It is very important to know both models and be able to relate or map the layers of one to the other.

    pdf1p thanhha 27-08-2009 136 25   Download

  • Application Layer Functionality and Protocols. In this chapter, you will learn to: Describe how the functions of the three upper OSI model layers provide network services to end user applications. Describe how the TCP/IP Application Layer protocols provide the services specified by the upper layers of the OSI model. Define how people use the Application Layer to communicate across the information network. Describe the function of well-known TCP/IP applications, such as the World Wide Web and email, and their related services (HTTP, DNS, SMB, DHCP, SMTP/POP, and Telnet)....

    pdf51p thanhtung_hk 03-11-2010 80 25   Download

  • A computer network is the infrastructure that allows two or more computers (called hosts) to communicate with each other. The network achieves this by providing a set of rules for communication, called protocols, which should be observed by all participating hosts. The need for a protocol should be obvious: it allows different computers from different vendors and with different operating characteristics to ‘speak the same language’. This chapter introduces the fundamental concepts of computer networks.

    pdf198p dee07_bk 04-02-2012 55 23   Download

  • This thesis examines how artificial neural networks can benefit a large vocabulary, speaker independent, continuous speech recognition system. Currently, most speech recognition systems are based on hidden Markov models (HMMs), a statistical framework that supports both acoustic and temporal modeling. Despite their state-of-the-art performance, HMMs make a number of suboptimal modeling assumptions that limit their potential effectiveness.

    pdf186p kuckucucu 15-05-2012 77 23   Download

  • This document provides design guidance for enterprises that want to provide Internet and limited corporate access for their guests and partners. Several solutions for guest and partner access challenges are proposed and analyzed in this document, at both the architectural and functional levels.

    pdf58p batrinh 11-08-2009 193 22   Download

  • The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies.

    pdf2793p truongnghen 21-01-2013 48 17   Download

  • This document provides network architects with a general understanding of how to leverage network virtualization to make a centralized NAC Appliance deployment easier. This document allows the network architect to select a design and reference the specific implementation details in the associated design guides. The foundation technologies associated with enterprise network virtualization architecture are divided into the following three functional areas: • Access control • Path isolation • Services edge...

    pdf14p batoan 10-08-2009 86 13   Download

Đồng bộ tài khoản