intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

New information networks

Xem 1-20 trên 20 kết quả New information networks
  • For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.

    pdf11p viyoko 01-10-2024 2 1   Download

  • This paper proposes a new method of representing malicious code as an image by arranging highly correlated bytes in close pixels in the image. The current research trains deep learning models on self-built datasets and compare the performance of different image representation methods.

    pdf9p viyoko 01-10-2024 3 1   Download

  • Social media are currently building their own empire and power since they have great influence in a flat world. They play an important role in the communication of human beings i.e. sharing information and connecting people. Social media have become the main sources of getting latest news and platforms to spread ideas and mindsets. It is therefore essential to know and understand social media’s key vocabulary and terminologies. The paper analyses and synthesizes 100 collected words concerning social media.

    pdf4p tuongtrihoai 23-07-2024 7 2   Download

  • As objects become embedded with sensors and gain the ability to communicate, the new information networks promise to create new business models, improve business processes, and reduce costs and risks.

    pdf9p guineverehuynh 20-06-2020 14 2   Download

  • This paper proposes a procedural pipeline for wind forecasting based on clustering and regression. First, the data are clustered into groups sharing similar dynamic properties. Then, data in the same cluster are used to train the neural network that predicts wind speed. For clustering, a hidden Markov model (HMM) and the modified Bayesian information criteria (BIC) are incorporated in a new method of clustering time series data.

    pdf16p dieutringuyen 07-06-2017 37 2   Download

  • Dynamic routing protocols have evolved over several years  As networks have evolved and become more complex, new routing protocols have emerged.  Most institutions have migrated to new protocols, others are still in use.  The first version of RIP was released in 1982, but some of the basic algorithms within the protocol were used on the ARPANET as early as 1969.

    pdf52p vanmanh1008 21-05-2013 72 6   Download

  • New technologies enable acquisition of large data-sets containing genomic, proteomic and metabolic information that describe the state of a cell. These data-sets call for systematic methods enabling relevant information about the inner workings of the cell to be extracted. One important issue at hand is the understanding of the functional interactions between genes, proteins and metabolites.

    pdf11p awards 06-04-2013 26 2   Download

  • Wireless technology has enormous potential to change the way people and things communicate. Future wireless networks will allow people on the move to communicate with anyone, anywhere, and at any time using a range of high-performance multimedia services. Wireless video will support applications such as enhanced social networking, distance learning and remote medicine. Wireless sensor networks can also enable a new class of intelligent home electronics, smart and energy-efficient buildings and highways, and in-body networks for analysis and treatment of medical conditions....

    ppt33p muathu_102 28-01-2013 76 6   Download

  • When installing a manually configured adapter, what information must you know to avoid resource conflicts? A. IRQ B. Number of bits C. Base I/O port address D. Base Memory address E. Operating System 2) Which IRQ is usually assigned for the primary IDE hard disk controller? A. 5 B. 7 C. 9 D. 14 E. 15 3) Which IRQ is assigned to the first serial port?

    doc5p nguyenbeo86 24-11-2012 48 2   Download

  • At present, great hopes are placed on information technology as the sources of industry regeneration and new economic growth. This is because the roles of IT have been expanded from the tools for manufacturing cost reduction and service speedup to those for effective collaboration among enterprises and the creation of new industries. From now on, the rise or fall of an enterprise will be determined by quality of computerization investment. It is therefore an urgent matter to bring up engineers who construct advanced information systems and those who utilize them....

    pdf40p dangphuc1302 13-07-2012 89 11   Download

  • THE TELEPHONE NETWORK The early history of the telephone system has been outlined in Chapter 1. The growth of the telephone system has been truly phenomenal and forecasts show a continuing growth as new services such as data transfer, facsimile and mobile telephone are added. The telephone differs from the broadcasting system in two basic ways: (1) In broadcasting, a few people who, in theory, have information send it out to the many who are presumed to want the information; it is one-way traffic....

    pdf53p tienvovan 11-09-2010 65 7   Download

  • Mobile Telephone Networks Being away from a telephone, a telex or a facsimile machine has become unacceptable for many individuals, not only because they cannot be contacted, but because they may be deprived also of the opportunity to refer to others for advice or information. For these individuals, the advent of mobile communications promises a era, one in which there will never be excuse for being new an ‘out-of-touch’.

    pdf21p huggoo 20-08-2010 64 4   Download

  • Intelligent Networks and Services By storing a massive ‘memory’ of customer and service information ina network, andreferring to it while setting up calls, and as a historical record of network use, a phenomenal new range of services becomes possible. The effect is almost as if the network had some degree of ‘intelligent’ power of thought

    pdf18p huggoo 20-08-2010 68 5   Download

  • To successfully execute an attack against an organization, the attacker must first perform reconnaissance to gather as much intelligence about the organization as possible. Many traditional methods for gaining intelligence about targets still work today, such as dumpster diving, querying public databases, and querying search engines. However, new methods that rely on gathering information from technologies such as social networking applications are becoming more commonplace.

    pdf30p thachcotran 04-02-2010 127 44   Download

  • Information services for various federal agency backbone networks were provided by the sponsoring agencies. NASA, for example, provided NSI information services. Internet registration services were provided by DISA NIC, operated by Government Services, Inc. (GSI). Information services for campus-level providers were provided by NSFNET mid-level network organizations. Information services for NSFNET mid-level network providers were provided by Merit, Inc. Under the new solicitation, NIS managers should provide services to end-users and to campus and mid-level network service providers.

    pdf20p longtuyenthon 26-01-2010 77 10   Download

  • "Warfare" can be broadly defined as "the waging of armed conflict against an enemy." In this module we will consider what warfare means in the context of today's information systems and networks. We will see that the fundamental principles of warfare known for thousands of years are still relevant on today's new battleground.

    pdf42p huyhoang 07-08-2009 123 12   Download

  • The various Component Object Model (COM) components, such as Microsoft® ActiveX® Data Objects (ADO) 2.5 and CDO for Exchange 2000 Server (CDOEX) provide extensive libraries of constants in their associated type libraries. Using the new Microsoft Internet Information Services (IIS) Web page keyword METADATA, you can easily import these constants into your ASP applications and make them globally available when you write scripts.

    pdf30p huyhoang 07-08-2009 96 17   Download

  • This book has been developed, in cooperation with Microsoft Corpora- tion, to give you the critical skills and knowledge you need to prepare for one of the elective requirements of the new MCSE certification program for Win- dows 2000 Security. You will find the information you need to acquire a solid understanding of Windows 2000 Security; to prepare for Exam 70-220: Designing Security for a Microsoft® Windows® 2000 Network; and to progress toward MCSE certification.

    pdf0p phongthinh 07-08-2009 153 41   Download

  • This section describes the new networking features of Oracle Database 10g 10g Release 1 (10.1) and provides pointers to additional information. New features information from previous releases is also retained to help those users migrating to the current release.

    pdf434p thuxuan 03-08-2009 95 13   Download

  • The relatively favourable overall growth of productivity in Finnish economy in recent years conceals the fact that there are remarkable sectoral differences in productivity development. The rapid productivity growth in sectors which produce information and communications technologies (ICT), such as the electrical and electronics industry, is contrasted with slackened growth in most other industries. Finnish companies’ overall record in turning the new technological opportunities permitted by advanced ICT into gains in productivity has been relatively poor.

    pdf17p monkey68 13-03-2009 157 15   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2