intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer network systems

Xem 1-20 trên 152 kết quả Computer network systems
  • This thesis develops a flexible customer behavior analysis system, including essential head pose estimation or F-formation modules. This system will be evaluated in an actual retail store. Further, after studying the system, realizing the mentioned problems of the head pose problem, we also propose a process to collect the head pose dataset and multi-task deep neural network model, fusing face detection and head pose estimation to yield face position and head pose at the same time.

    pdf72p khanhchi0912 12-04-2024 4 2   Download

  • In this study, MCS is applied to compute the reliability of the nodes and the network under uncertain demand and roughness, and to determine how reliability is distributed among the various nodes of WDN, as well as assessing the reliability of the network as a series or parallel system. The effect of the resilience index on the nodal and network reliability is also assessed.

    pdf199p runthenight05 01-03-2023 9 3   Download

  • In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.

    pdf185p runthenight04 02-02-2023 7 2   Download

  • Objective: Objective of this dissertation is to find a novel method to reduce computation cost as well as memory requirement but still retain accuracy in video-based person ReID approach. In video-based person ReID, computation cost and memory requirement are the two main issues. Working with a large number of images is the burden of any surveillance system. This results in a high computation cost as well as a large memory capacity.

    pdf143p armyofthedead 23-06-2021 15 4   Download

  • In recent years, optical orthogonal frequency division multiplexing (OOFDM) has emerged as a dominant research and development area in the field of high-speed optical communications. OFDM is a potential candidate as the most promising next-generation optical networks such as passive optical networks and optical transport networks, due to their simple configuration based on low cost, high speed data rates, high spectral efficiency, high quality of service and robustness against narrow band interference, frequency selective fading, and chromatic dispersion.

    pdf99p nguathienthan12 18-05-2021 21 7   Download

  • In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.

    pdf55p tamynhan0 04-07-2020 13 3   Download

  • Module 3 - Resolving names. This module provides you with the knowledge and skills to assign computer names to the IP addresses of the source and destination hosts, and then use the computer name to contact the hosts.

    ppt20p nomoney2 10-02-2017 64 3   Download

  • Chapter summary: Bridges selectively relay packets between network segments, depending on their data-link layer destination addresses; bridges maintain a single broadcast domain and create separate collision domains; switches improve on the function of bridges by forwarding packets only to their destination systems;...and other contents.

    pdf16p tangtuy08 21-04-2016 41 3   Download

  • In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...

    pdf15p tangtuy08 21-04-2016 36 3   Download

  • In this chapter, students will be able to understand: Routers receive packets and use the most efficient path to forward them to their destinations, complex internetworks can have redundant routers that provide multiple paths to the same destination, routers store information about the network in a routing table,...

    pdf4p tangtuy08 21-04-2016 46 2   Download

  • This chapter includes contents: Types of remote network connections, public switched telephone network (PSTN), modems, modem communications, configuring a modem, Virtual Private Network (VPN) communications,...

    pdf13p tangtuy08 21-04-2016 39 2   Download

  • Chapter summary: Computers have a variety of ports, some of which are implemented by the motherboard and others by expansion cards; computers use many different types of connectors fortheir various interfaces, and in some cases the same connector type can provide different functions; SCSI host adapters can use any one of several types of connectors, which are not interchangeable;...

    pdf16p tangtuy08 21-04-2016 36 4   Download

  • Chapter overview: Introduction to network troubleshooting, incident administration, gathering information, possible causes: Internet router problem, internet communication problem, domain Name System (DNS) failure, local area network (LAN) communication problem, computer configuration problem, user error.

    pdf20p tangtuy08 21-04-2016 51 3   Download

  • This chapter includes contents: Why does the organization want a new network installed? What services does the organization want the network to provide? Evaluating the installation site, evaluating distances between components, environmental conditions,...

    pdf12p tangtuy08 21-04-2016 45 2   Download

  • Chapter summary: External unshielded twisted pair (UTP) cable installations use prefabricated cables to connect computers directly to hubs; internal cable installations use bulk cable, which you pull through walls, ceilings, or floors; to connect two computers without a hub, you must use a crossover cable connection, which reverses the transmit and receive signals;...

    pdf18p tangtuy08 21-04-2016 35 2   Download

  • Chapter summary: Magnetic tape is the most popular storage medium for backups; backup software enables you to select the data you want to back up and sends it to the device you use for backups; daily backup jobs can be full backups, incremental backups, or differential backups;...

    pdf20p tangtuy08 21-04-2016 44 2   Download

  • Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices....

    ppt18p doanhung_dtvtk10 19-03-2013 69 5   Download

  • Với thủ thuật nhỏ sau đây, bạn có thể lấy lại 20% băng thông đó nhằm tăng tốc duyệt web. 1. Vào Start Run, gõ gpedit.msc để truy cập vào Group Policy. 2. Mở mục Computer Configuration Administrative Templates Network QOS Packet Scheduler. 3. Bấm đôi vào Limit Reservable Bandwidth, bạn sẽ thấy phần này được chọn là Not Configured, nhưng thực tế là nó đã được chọn giới hạn ở mức 20% băng thông. Bạn xem thẻ Explain bên trái: “By default, the Packet Scheduler limit the system to 20 percent of the bandwidth of...

    pdf3p bibocumi34 17-03-2013 71 6   Download

  • IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.

    ppt18p muathu_102 28-01-2013 57 5   Download

  • The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems

    ppt19p muathu_102 28-01-2013 47 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2