intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network coding

Xem 1-20 trên 98 kết quả Network coding
  • This study seeks to develop a prediction model to estimate the bond strength of FRP bars in concrete, utilizing an extended dataset from 1010 pull-out tests. Initially, the study evaluates the applicability of several bond strength formulas from existing codes.

    pdf16p vibecca 01-10-2024 3 0   Download

  • This paper proposes a new method of representing malicious code as an image by arranging highly correlated bytes in close pixels in the image. The current research trains deep learning models on self-built datasets and compare the performance of different image representation methods.

    pdf9p viyoko 01-10-2024 3 1   Download

  • Cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" giới thiệu tới người đọc các kiến thức về windows forms, security, kết hợp nhiều phần, file, web development, web services, các chủ đề cao cấp, xử lý dữ liệu. Sách gồm có 10 chủ đề lớn, phần 1 ebook sau đây gồm có các nội dung sau: Windows form, security, kết hợp nhiều phần, file, web development, web services, language. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.

    pdf361p runordie6 06-08-2022 26 7   Download

  • Nối tiếp các nội dung phần 1, phần 2 cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" gồm có những nội dung chính sau: Các chủ đề cao cấp, xử lý dữ liệu, Microsoft .Net framework. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.

    pdf542p runordie6 06-08-2022 11 7   Download

  • The thesis focuses on researching and developing solutions to shared resources allocation for users in distributed system and optimally communication resources allocation for distributed system in virtualization system based on network coding.

    pdf27p gaocaolon6 30-07-2020 28 1   Download

  • Mã hóa mạng - Network Coding (NC) lần đầu tiên được đề xuất trong là một kỹ thuật hứa hẹn đạt được dung lượng max-flow min-cut trong truyền dẫn đa đường. Mã hóa mạng tuyến tính được biết như là một biện pháp hiệu quả để tăng thông lượng mạng. Mã hóa mạng thông thường được áp dụng cho các mạng không dây.

    pdf9p vitomato2711 11-03-2020 21 3   Download

  • Bài viết đề xuất một hệ thống kết hợp kỹ thuật điều chế không gian (Spatial Modulation – SM) và mã hóa mạng lớp vật lý (Physical-layer Network Coding – PNC) nhằm nâng cao hiệu suất sử dụng phổ tần số và thông lượng của hệ thống thông tin vô tuyến chuyển tiếp.

    pdf10p viengland2711 23-07-2019 60 3   Download

  • Đồ Án Tổng Hợp.Đề Tài: Tổng Quan Về Công Nghệ W-CDMA..Tên đề tài:..Tổng quan về công nghệ W-CDMA.Sinh viên: Nguyễn Trung Tuấn.GVHD:..Th.S. Trần Thanh Hà..Lớp:..09LTĐT..GVHD: Th.S. Trần Thanh Hà..1..SVTH: Nguyễn Trung Tuấn...Đồ Án Tổng Hợp.Đề Tài: Tổng Quan Về Công Nghệ W-CDMA..LỜI NÓI ĐẦU.Nhu cầu trao đổi thông tin là nhu cầu thiết yếu trong xã hội hiện đại. Các hệ thống.thông tin di động với khản năng giúp con người trao đổi thông tin mọi lúc, mọi nơi đã.phát triển rất nhanh và đang trở thành không thể thiếu được trong xã hội thông tin ngày.nay.

    pdf78p bautroibinhyen1 02-11-2016 163 11   Download

  • Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

    pdf43p nhanmotchut_3 20-10-2016 63 4   Download

  • Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.

    pdf43p nhanmotchut_3 20-10-2016 64 6   Download

  • This chapter is an introduction to the application layer. In the next eight chapters we introduce common client-server applications used in the Internet. In this chapter, we give a general picture of how a client-server program is designed and give some simple codes of their implementation. The area of network programming is a very vast and complicated one; it cannot be covered in one chapter. We need to give a bird’s-eye view of this discipline to make the contents of the next eight chapters easier to understand.

    ppt20p tangtuy09 26-04-2016 55 3   Download

  • Preamble/SOFD: Synchronize to medium. Destination Address: MAC Address of destination device. Source Address: MAC address of source device. • Length/Type: Length of frame or protocol type code. Data: Encapsulated data from OSI Layers 7 to 3. FCS: Frame Check Sequence.Broadcast: Indicates a broadcast or multicast frame. Local: indicates whether the address can be modified locally. OUI Number: Manufacturer of the NIC. Vendor Number: Unique, vendor assigned number.

    pdf77p vanmanh1008 21-05-2013 48 3   Download

  • Communications is a process by which information is exchanged between individuals through a common system of symbols, signs, or behaviour “It is about communication between people; the rest is technology” Communication systems are reliable, economical and efficient means of communications Public switched telephone network (PSTN), mobile telephone communication (GSM, 3G, 4G...), broadcast radio or television, navigation systems, ... The course is aiming at introducing fundamental issues required for understanding and designing a (digital) communication system...

    ppt28p doanhung_dtvtk10 24-03-2013 82 7   Download

  • The metabolic network is an important biological network which consists of enzymes and chemical compounds. However, a large number of meta-bolic pathways remains unknown, and most organism-specific metabolic pathways contain many missing enzymes. We present a novel method to identify the genes coding for missing enzymes using available genomic and chemical information from bacterial genomes.

    pdf12p galaxyss3 19-03-2013 44 3   Download

  • The Data-over-Cable Service Interface Specification (DOCSIS)is an international standard developed by CableLabs, a non-profit research and development consortium for cable-related technologies. • DOCSIS specifies the OSI Layer 1 and Layer 2 requirements: Physical layer-For data signals that the cable operator can use, DOCSIS specifies the channel widths (bandwidths of each channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and 6.4 MHz. DOCSIS also specifies modulation techniques (the way to use the RF signal to convey digital data).

    pdf47p mrdvad11 12-03-2013 135 54   Download

  • Each of the messages, like each one he had ever read of Stern's commands, began with a number and ended with a number or row of numbers. No efforts on the part of Mungo or any of his experts had been able to break Stern's code, nor was there any clue as to what the preliminary number and those ultimate numbers signified. —Talking to Strange Men, Ruth Rendell

    ppt22p muathu_102 28-01-2013 66 6   Download

  • At cats' green on the Sunday he took the message from the inside of the pillar and added Peter Moran's name to the two names already printed there in the "Brontosaur" code. The message now read: “Leviathan to Dragon: Martin Hillman, Trevor Allan, Peter Moran: observe and tail.” What was the good of it John hardly knew. He felt better, he felt that at last he had made an attack on Peter Moran instead of waiting passively and effecting no retaliation. Besides, what was the use of being in possession of the key to the codes if he never took...

    ppt22p muathu_102 28-01-2013 63 5   Download

  • John wrote the letters of the alphabet under the letters in its first lines and tried it against the message. Immediately he knew that once more he had broken the code. It was extraordinary the feeling of triumph he had. He felt on top of the world. For not only had he done it, had he broken the July code, but he now had the key to every future coded message, since instructions as to the source of the next one must of necessity appear in the current one at the end of each month. —Talking to Strange Men, Ruth Rendell ...

    ppt23p muathu_102 28-01-2013 54 2   Download

  • All the afternoon Mungo had been working on Stern's code, principally with the aid of the latest messages which he had copied down at the Nevin Square drop. Stern was very confident. He must be well aware London Central knew about that drop. It was obvious that they didn't care how often Mungo read their messages, so confident were they in the impenetrability of the code. —Talking to Strange Men, Ruth Rendell

    ppt37p muathu_102 28-01-2013 43 2   Download

  • This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment. It contains many, but not all, issues professionals are likely to face. Section 1 outlines fundamental ethical considerations Section 2 addresses additional, more specific considerations of professional conduct. Section 3 pertain more specifically to individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as with organizations like ACM. Section 4 addresses principles involving compliance with this Code ...

    ppt10p muathu_102 28-01-2013 54 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2