The Computer Program
-
In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.
55p tamynhan0 04-07-2020 13 3 Download
-
Software-defined networking aims to change the inflexible state networking, by breaking vertical integration, separating the network’s control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network. Consequently, SDN is an important key for resolving aforementioned difficulties.
130p cotithanh000 07-10-2019 29 5 Download
-
Research object are the organization and state management activities on ITI in Vietnam. The scope limited in the contents of state management on ITI systems, focusing on policies, strategies, planning, plans and programs; legal documents; inspection and examination to eliminate violations; organizing the state management apparatus on ITI in the field of manufacturing computer hardware and computer software.
30p dungmaithuy 18-09-2019 46 4 Download
-
Microfabricated accelerometer sensors have been developed to measure acceleration in a variety of applications, including automobile airbag crash sensors and seismic activity monitors. For this thesis a three-dimensional accelerometer sensor has been created for measuring involuntary human hand motion. The sensor uses three single-axis accelerometers fabricated at the MIT Microsystems Technology Laboratory.
110p nguyenthai_thinh 13-01-2016 40 4 Download
-
Parallel Implementation of MAFFT on CUDA-Enabled Graphics Hardware present a new approach to accelerat- ing MAFFT on Graphics Processing Units (GPUs) using the Compute Unified Device Architecture (CUDA) programming model. Compared with the implementations of other MSA algorithms on GPUs, parallelization of MAFFT is more challenging since the space complexity.
14p ducla78 30-07-2015 48 6 Download
-
Geo-electrical tomographical software plays a crucial role in geophysical research. However, imported software is expensive and does not provide much customizability, which is essential for more advanced geophysical study. Besides, these programs are unable to exploit the full potential of modern hardware, so the running time is inadequate for large-scale geophysical surveys. It is therefore an essential task to develop domestic software for overcoming all these problems.
60p 01202750693 09-06-2015 62 13 Download
-
Purposes of the research Building a new method (method directly applicable limit theorem) evaluate soil stabilization in accordance with the actual working of the soil environment, the study contributes to the development of stable subgrade; applying the above method to build a computer program, set the tables and nomogram helps engineers quickly determine the height and slope of embankment limited.
30p nganhanggddt2014 01-07-2014 94 6 Download
-
I remember switching off all the lights and locking the door carefully before coming here. switch off /sw t f/ working (tắt máy và có ngắt hẳn nguồn điện) .to enter a restricted area on a computer system I had forgotten my password and couldn't log in /l n/ (đăng nhập vào một khu vực bị giới hạn trên máy tính) to close a computer program that requires a sign /sa n a t/ out (thoát một chương trình máy tính có yêu cầu tên đăng nhập và mật khẩu)...
7p lephinoinhieu 03-08-2013 59 7 Download
-
Windows Vista: Cách thiết lập truy cập ứng dụng mặc định .Trong bài này Quản Trị Mạng sẽ hướng dẫn bạn cách thiết lập chương trình mặc định cho các file và giao thức. Các thiết lập này có thể thực hiện tại cửa sổ Set Program Access and Computer Defaults, tại đây bạn có thể tìm thấy các tùy chọn thay đổi ứng dụng mặc định cho các hoạt động như là trình duyệt web, thư điện tử hay trình tin nhắn tức thời…...
6p comvapho 31-07-2013 79 4 Download
-
The application hitcounter presents a simple hitcounter for your website. It is possible to enter blocklists in a configfile so robots and perhaps your own computer are excluded from the statistics. There are still a lot of improvements possible ofcourse like setting a cookie so you get only one hit per sessio
1p sakuraphuong 05-06-2013 69 5 Download
-
Exception handling is the process of responding to the occurrence, during computation, of exceptions – anomalous or exceptional events requiring special processing – often changing the normal flow of program execution. It is provided by specialized programming language constructs or computer hardware mechanisms.
1p sakuraphuong 05-06-2013 81 3 Download
-
A computer program has been evaluated for subsite map calculations of depolymerases. The program runs inWIN-DOWSanduses the experimentallydeterminedbond cleavage frequencies (BCFs) for determination of the number of subsites, the position of the catalytic site and for calculation of subsite binding energies. The apparent free energy values were optimized by minimization of the differences of the measured and calculated BCF data.
6p tumor12 22-04-2013 39 5 Download
-
We developed caitra, a novel tool that aids human translators by (a) making suggestions for sentence completion in an interactive machine translation setting, (b) providing alternative word and phrase translations, and (c) allowing them to postedit machine translation output. The tool uses the Moses decoder, is implemented in Ruby on Rails and C++ and delivered over the web. We are at the beginning of a research program to explore the benefits of these different types of aid to human translators, analyze user interaction behavior, and develop novel types of assistance. ...
4p hongphan_1 15-04-2013 61 2 Download
-
Task A executes and starts to write the string “Hello world” to the LCD. Task A is pre-empted by Task B after outputting just the beginning of the string – “Hello w”. Task B writes “Abort, Retry, Fail?” to the LCD before entering the Blocked state. Task A continues from the point at which it was preempted and completes outputting the remaining characters – “orld”. The LCD will now be displaying the corrupted string “Hello wAbort, Retry, Fail?orld”. Read, Modify, Write Operations /* The C code being compiled. */ 155: PORTA |= 0x01; /* The assembly code produced. */ LDR R0,[PC,#0x0070] ;...
19p la_la123 04-04-2013 55 9 Download
-
FreeRTOS cho phép s d ng ng t. T t c các API có tên k t thúc b ng “FromISR” ho c “FROM_ISR” thì ñư c s d ng trong ISR. .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 2 .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 3 .Binary semaphore use for synchronization Binary semaphore use for synchronization BÙI QU C B O 4 .
18p la_la123 04-04-2013 54 6 Download
-
Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices....
18p doanhung_dtvtk10 19-03-2013 69 5 Download
-
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.
18p muathu_102 28-01-2013 57 5 Download
-
The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems
19p muathu_102 28-01-2013 47 4 Download
-
Đa số đều có những đặc điểm chung như: thể hiện tên của mình trong “Program Files”, đặt biểu tượng hoạt động của mình ở khay đồng hồ, có thể dễ dàng phát hiện sự hoạt động của nó trong thẻ “Applications” của “Windows Task Manager”, không được trang bị chế độ hoạt động ngầm, có thể dễ dàng gỡ bỏ... Sau đây là tám chương trình keylogger thuộc hàng “chính đạo” phổ biến hiện nay. a. 1-ACT Computer Spy 2006: thư mục cài đặt mặc định mang tên Only PCTools All-in-One\1-ACT Computer Spy 2006; file thực thi có tên AdvKeylog.exe;...
3p bibocumi28 21-01-2013 64 10 Download
-
Hãng AVG vừa phải phát hành các hướng dẫn giúp người dùng chương trình AVG 2011 miễn phí, trên Windows 64-bit, khôi phục máy tính trở lại thời điểm trước khi xảy ra lỗi khởi động do cập nhật cơ sở dữ liệu nhận diện virus. Những ai đã cập nhật cơ sở dữ liệu nhận diện virus số 271.1.1/3292 trên Windows 7, Vista, XP, sẽ nhận thông báo 'STOP: c0000135 The program can't start because %hs is missing from your computer. Try reinstalling the program to fix this problem. (Chương trình không thể khởi động vì thiếu %hs trên...
3p bibocumi28 19-01-2013 131 4 Download