Xem 1-20 trên 358 kết quả Network methods
  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Process Neural Network Method: Case Study I: Discrimination of Sweet Red Peppers Prepared by Different Methods

    pdf8p sting05 09-02-2012 17 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article A Two-Stage Bayesian Network Method for 3D Human Pose Estimation from Monocular Image

    pdf16p sting07 17-02-2012 16 3   Download

  • In a prior edition of this book the preface commenced with the paraphrase of an old adage in an era of evolving local area networking technology: Ethernet is dead—long live Ethernet! Although advances in communications technology continue to occur at a rapid pace, that paraphrase continues to be valid. Within the past decade, the bandwidth of 10 Mbps Ethernet was advanced by a factor of one thousandwith the introduction of a series of enhancements to the original Ethernet specification. First, Fast Ethernet resulted in the bandwidth of Ethernet increasing by a factor of 10 to 100 Mbps.

    pdf599p nhungmon 19-03-2009 2459 1798   Download

  • Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.[1] Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level (layer) of the OSI model network structure....

    ppt47p acxelopanh 01-12-2009 240 157   Download

  • More complex networking services in Red Hat Linux require more advanced administration methods. While graphical tools such as Network Configuration (via the redhat-config-network command) are available to assist in configuring all aspects of Linux networking, the best way to learn networking is by practicing with the key command line utilities and associated configuration files.

    pdf54p mylinh 17-08-2009 206 71   Download

  • A java application can run inside a JVM and can only invoke the methods of the classes available inside this JVM • Distributed computing or processing resolves around clientserver technology where several client programs communicate with one or more server applications.An RMI application has to expose methods, which remote clients can invoke. • These methods which are meant to be remote, should be defined in an interface which extends the java.rmi.Remote interface

    ppt19p blackfalconbm 07-11-2012 55 37   Download

  • Data Link Layer. Learning Objectives Upon completion of this chapter, you will be able to: Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. ...

    pdf48p thanhtung_hk 03-11-2010 132 34   Download

  • AVVID (Architecture for Voice, Video, and Integrated Data), the latest development from Cisco Systems is redefining the way businesses communicate. AVVID allows businesses to transmit voice, data, and video over a single integrated architecture, whereas in the past three separate systems were required. Administering Cisco AVVID Applications is a professional reference detailing the strategies, tactics, and methods for utilizing Cisco software to configure and maintain Cisco networks and hardware infrastructures.

    pdf70p hoa_thuyvu 17-10-2011 76 30   Download

  • This module explains how to use methods, parameters, and overloaded methods. It also explains that breaking program logic into functional units is good design and makes it easier to reuse code. The module begins with an explanation of what methods are, how they are created, and how they can be called. The module briefly describes private and public access modifiers (which are discussed more fully in later modules). The module concludes with an explanation of method overloading and the rules regarding method signatures....

    pdf54p vuthuong 11-08-2009 74 22   Download

  • This book is designed to be a definitive work for your use in understanding the concepts of protection, the terminology and pieces of the demilitarized zone (DMZ) structure, and design of the DMZ for the enterprise.A DMZ is a method of providing segregation of networks and services that need to be provided to users, visitors, or part- ners through the use of firewalls and multiple layers of filtering and control to protect internal systems.

    pdf0p trannhu 08-08-2009 89 20   Download

  • OSI, TCP/IP model o IP, TCP packet architecture o Protocols: HTTP, DNS… Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security 3 .OSI model 4 .TCP/IP model 5 .

    pdf49p muathu_102 28-01-2013 51 18   Download

  • This thesis addresses two neural network based control systems. The first is a neural network based predictive controller. System identification and controller design are discussed. The second is a direct neural network controller. Parameter choice and training methods are discussed. Both controllers are tested on two different plants. Problems regarding implementations are discussed. First the neural network based predictive controller is introduced as an extension to the generalised predictive controller (GPC) to allow control of non-linear plant.

    pdf163p o0_mrduong_0o 30-03-2013 35 16   Download

  • The demand for QoS to ensure the quality of real-time services must take into account not only network parameters are static but dynamic. Therefore, the QoS measures need introduced in the network to the quality of real-time services can be ensured. the The most common construction of a routing problem in an optimal distribution network data based on a multicommodity flow optimization whereby a separate objective function minimized for all kinds of restricted flow multicommodity flow.

    pdf524p samsungwifi 03-04-2012 151 15   Download

  • A comprehensive introduction to the most popular class of neural network, the multilayer perceptron, showing how it can be used for system identification and control. The book provides readers with a sufficient theoretical background to understand the characteristics of different methods, and to be aware of the pit-falls so as to make the correct decisions in all situations. This is a very application-oriented text that gives detailed and pragmatic recommendations to guide users through the plethora of methods suggested in the literature.

    pdf38p o0_mrduong_0o 30-03-2013 48 11   Download

  • Transmission Basics and  Networking Media Explain basic data transmission concepts, including full duplexing, attenuation, and noise Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media Compare the benefits and limitations of different networking media Identify the best practices for cabling buildings and work areas Specify the characteristics of popular wireless transmission methods, including 802.11, infrared, and Bluetooth

    ppt52p itvovantien 13-07-2012 50 10   Download

  • Topologies and Access Methods Describe the basic and hybrid LAN physical topologies, and their uses, advantages and disadvantages Describe the backbone structures that form the foundation for most LANs Compare the different types of switching used in data transmission Understand the transmission methods underlying Ethernet, Token Ring, FDDI, and ATM networks Describe the characteristics of different wireless network technologies, including Bluetooth and the three IEEE 802.11 standards

    ppt51p itvovantien 13-07-2012 35 10   Download

  • WANs, Internet Access, and Remote Connectivity Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Describe different WAN transmission and connection methods, including PSTN, ISDN, T-carriers, DSL, broadband cable, SONET, and wireless Internet access technologies Compare the characteristics of WAN technologies, including throughput, security, and reliability Describe the software and hardware requirements for remotely connecting to a network...

    ppt56p itvovantien 13-07-2012 41 9   Download

  • Network Security Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and 802.11...

    ppt56p itvovantien 13-07-2012 40 9   Download

  • Tham khảo tài liệu 'art of surface interpolation-chapter 2 the abos method', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf17p jupyter 30-07-2010 46 8   Download

  • This revision brings the reader completely up to date on the evolving methods associated with increasingly more complex sample types analyzed using high-performance liquid chromatography, or HPLC. The book also incorporates updated discussions of many of the fundamental components of HPLC systems and practical issues associated with the use of this analytical method. This edition includes new or expanded treatments of sample preparation, computer assisted method development, as well as biochemical samples, and chiral separations....

    pdf542p doilan 26-01-2013 32 8   Download

Đồng bộ tài khoản