intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Components of a Network

Xem 1-20 trên 307 kết quả Components of a Network
  • Construction industry of Malaysia is a complex and confronts with serious issues of cost overrun. Construction supply chain which involves multi-layered supply network carries lot of potential for conflict and additional costs involving additional transaction cost. To tackle this issue, the primary aim of this study is to identify component of waste in transaction cost within multi-layered supply chain network in Malaysian construction industry. The qualitative research approach is adopted to achieve the research objectives of this study.

    pdf7p longtimenosee09 08-04-2024 2 2   Download

  • The growth factor receptor network (GFRN) plays a significant role in driving key oncogenic processes. However, assessment of global GFRN activity is challenging due to complex crosstalk among GFRN components, or pathways, and the inability to study complex signaling networks in patient tumors.

    pdf19p vioraclene 31-03-2024 2 2   Download

  • Part 2 book "A textbook of electrical technology (Vol 1 - Basic electrical engineering)" includes content: A.C. fundamentals, complex numbers, parallel A.C circuits, A.C network anaylsis, A.C bridges, A.C. filter networks, circle diagrams, polyphase circuits, harmonics, fourier series, transients, symmetrical components, introduction to electrical energy generation.

    pdf412p muasambanhan06 03-02-2024 2 2   Download

  • Cutting force (CF) is one of the most important factors in improving machining efficiency. It directly affects the cutting tool life and the quality of the product. This paper presents the results of building a model to predict the value of the cutting force components using a back-propagation (BP) neural network when dry and hard turning SKD11 steel after heat treatment.

    pdf7p vimarillynhewson 02-01-2024 5 3   Download

  • In this paper, we introduce a novel approach to enhance the capabilities of the humanoid robot IVastBot by in- tegrating various software components. This integration enables IVastBot to effectively recognize and respond to a wide array of human gestures and behaviors.

    pdf12p vimichaelfaraday 28-12-2023 7 4   Download

  • Firewalls are one of the main components used in securing a network infrastructure, and having an indepth understanding of how these devices function is paramount to maintaining a secure network. This book was written to provide an understanding of the functionality of the Firewall Services Module (FWSM), from both a hardware and software perspective and to be a practical design guide with configuration examples for the design, implementation, operation, and management of FWSM in various deployment scenarios.

    pdf519p haojiubujain09 30-11-2023 7 4   Download

  • This protocol is a great component of the IoT universe due to its lightweight design and low power consumption. Distributed MQTT systems are typically needed in actual application environments because centralized MQTT methods cannot accommodate a massive volume of data.

    pdf13p visystrom 22-11-2023 5 4   Download

  • In this paper, we propose to use the combination of Imaging Graph Neural Network With Defined Pattern to detect vulnerabilities in smart contracts. We construct a contract graph that shows the relationship between the main components in a smart contract.

    pdf10p visystrom 22-11-2023 4 4   Download

  • This volume constitutes a report on the principal elements and important applications of soft computing as reported from some of the active members of this community. In its chapters, the book gives a prime introduction to soft computing with its principal components of fuzzy logic, neural networks, genetic algorithms, and genetic programming with some textbook-type problems given. There are also many industrial and development efforts in the applications of intelligent systems through soft computing given to guide the interested readers on their research interest track.

    pdf493p haojiubujain08 01-11-2023 2 1   Download

  • Ebook Ebook A+, Network+, Security+ Exams in a Nutshell part 1 includes contents: Chapter 1 Overview of A+ Essentials exam; Chapter 2 A+ Essentials study guide; Chapter 3 Prep and practice for the A+ Essentials exam; Chapter 4 Overview of the A+ Exams 220-602, 220-603, and 220-604; Chapter 5 Study guide for A+ Exams 220-602, 220-603, and 220-604; Chapter 6 Prep and practice for the A+ Exams 220-602, 220-603, and 220-604.

    pdf427p haojiubujain06 05-09-2023 5 2   Download

  • In this paper, a novel algorithm is proposed for the recognition of human faces and temperature using deep learning methods and thermal face images. The search-based method is developed for selection of an optimal structure and parameters of the convolutional neural network using the thermal images as the input.

    pdf6p viannee 02-08-2023 4 3   Download

  • The impact of different rice husk ash contents (5, 10, 20%) on mortar strength is examined at different elevated temperatures (150, 300, 450, 750oC). Based on a 45 experimental result data set, three machine learning algorithms including the Artificial Neural Network (ANN), the Least Squares Support Vector Regression (LS-SVR) and the Multivariate Adaptive Regression Splines (MARS) have been used to model the functional relationship between the mixture components and the compressive strength.

    pdf10p nhanchienthien 25-07-2023 4 4   Download

  • Continued part 1, part 2 of ebook "Global logistics management" presents the following content: arc selection and routing for restoration of network connectivity after a disaster; feasibility study of shuttle services to reduce bus congestion in downtown izmir; relocation of the power transmission and distribution division of a multinational electronics and electrical engineering company; location problems with demand regions; a new approach for synchronizing production and distribution scheduling - case study;...

    pdf128p dieptieuung 14-07-2023 5 2   Download

  • Lecture Network + Guide to Networks (6th Edition) - Chapter 10: Virtual Networks and Remote Access, objectives of this chapter: Explain virtualization and identify characteristics of virtual network components; Create and configure virtual servers, adapters, and switches as part of a network; Describe techniques for incorporating virtual components in VLANs.

    pdf41p chankora08 04-07-2023 5 3   Download

  • Improving the patient experience has become an essential component of any healthcare system’s performance metrics portfolio. In this study, we developed a machine learning model to predict a patient’s response to the Hospital Consumer Assessment of Healthcare Providers and Systems survey’s “Doctor Communications” domain questions while simultaneously identifying most impactful providers in a network.

    pdf10p vighostrider 25-05-2023 5 2   Download

  • An inter-laboratory comparison of a small-scale field experiment was conducted in the framework of the Korea retrospective dosimetry network (KREDOS) to verify the reliability and compatibility of thermoluminescence and optically stimulated luminescence techniques for accident dosimetry.

    pdf9p vironald 15-12-2022 9 3   Download

  • In the development of 5G mobile network, Fog computing becomes an emerging component of the Cloud computing paradigm as the 5G core to assure the diverse computational demands of IoT applications can be satisfied. A cloud-based application requires a combined use of cloud and local resources for its processing.

    pdf7p viharry 15-12-2022 12 4   Download

  • Community-based suicide prevention approaches can tailor activities at a local level and are recognised as a key component of national suicide prevention strategies. Despite this, research exploring their effects on completed suicides is rare. This study examined the effect of a national program of community suicide prevention networks on suicide rates in catchment areas across Australia.

    pdf7p viferrari 29-10-2022 2 2   Download

  • Lecture Data communications and computer networks: A business user's approach (8E) - Chapter 4. After reading this chapter, you should be able to: list the four components of all interface standards; discuss the basic operations of the USB and EIA-232F interface standards; cite the advantages of FireWire, Lightning, SCSI, iSCSI, InfiniBand, and Fibre Channel interface standards;... Please refer to the content of document.

    ppt40p tieuvulinhhoa 22-09-2022 13 5   Download

  • Lecture Data communications and computer networks: A business user's approach (8E) - Chapter 1. After reading this chapter, you should be able to: define the basic terms of computer networks Recognize the individual components of the big picture of computer networks; outline the common examples of communications networks; define the term convergence and describe how it applies to computer networks;... Please refer to the content of document.

    ppt43p tieuvulinhhoa 22-09-2022 14 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2