intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Topological features

Xem 1-20 trên 26 kết quả Topological features
  • Wireless networks - Lecture 39: Bluetooth/Wireless personal area networks (WPAN). The main topics covered in this chapter include: bluetooth introduction; technical features; access technique; bluetooth topology/scenario; specifications; architecture; core protocols; packet format; link connections;...

    ppt34p haoasakura 30-05-2022 11 3   Download

  • The Modular Multilevel Converter (MMC) is worldwide recognized as one of the most innovative converter topologies regarding renewable energy applications. The most significant features of using this configuration are less component count, less switching losses, and improved output voltage/current waveform.

    pdf4p vistephenhawking 26-04-2022 18 2   Download

  • Chromosome conformation capture data, particularly from high-throughput approaches such as Hi-C, are typically very complex to analyse. Existing analysis tools are often single-purpose, or limited in compatibility to a small number of data formats, frequently making Hi-C analyses tedious and time-consuming.

    pdf19p viarchimedes 26-01-2022 6 0   Download

  • The study of protein complexes and protein functional modules has become an important method to further understand the mechanism and organization of life activities. The clustering algorithms used to analyze the information contained in protein-protein interaction network are effective ways to explore the characteristics of protein functional modules.

    pdf14p vilichoo2711 25-06-2021 8 1   Download

  • Because biological networks exhibit a high-degree of robustness, a systemic understanding of their architecture and function requires an appraisal of the network design principles that confer robustness.

    pdf12p viwyoming2711 16-12-2020 6 1   Download

  • In the context of drug discovery, drug target interactions (DTIs) can be predicted based on observed topological features of a semantic network across the chemical and biological space. In a semantic network, the types of the nodes and links are different.

    pdf10p vioklahoma2711 19-11-2020 7 1   Download

  • Direct volume rendering is one of flexible and effective approaches to inspect large volumetric data such as medical and biological images. In conventional volume rendering, it is often time consuming to set up a meaningful illumination environment.

    pdf17p vioklahoma2711 19-11-2020 9 1   Download

  • In protein design, correct use of topology is among the initial and most critical feature. Meticulous selection of backbone topology aids in drastically reducing the structure search space. With ProLego, we present a server application to explore the component aspect of protein structures and provide an intuitive and efficient way to scan the protein topology space.

    pdf6p viconnecticut2711 28-10-2020 15 1   Download

  • Community detection algorithms are fundamental tools to uncover important features in networks. There are several studies focused on social networks but only a few deal with biological networks. Directly or indirectly, most of the methods maximize modularity, a measure of the density of links within communities as compared to links between communities.

    pdf25p vijisoo2711 27-10-2020 6 0   Download

  • Chapter 7 - The multilateral trade and investment framework. The main goals of this chapter are to: Provide a history of the development of the current world trading system, leading to a better understanding of the current international trade framework; explain the functioning, the achievements and the problems faced by the General Agreement on Tariffs and Trade (GATT); outline the new features of the World Trade Organisation (WTO).

    ppt34p nanhankhuoctai1 29-05-2020 25 0   Download

  • This method combines several image features using Speedup Robust Features (SURF) by accumulating them into a union form of features inside each place cluster. In this method, the mobile robot captures omnidirectional visual information and converts them into topological place clusters.

    pdf5p cathydoll5 27-02-2019 18 3   Download

  • Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.

    pdf40p nhanmotchut_3 20-10-2016 65 4   Download

  • After this lecture you should be able to: Describe the primary Vector data models used in GIS and give examples, describe raster data models and give examples, describe TIN data models, explain “topology”, describe the main file formats used in GIS.

    ppt70p hongmai1604 18-05-2014 41 4   Download

  • DBS3900 is a distributed BTS solution developed by Huawei Technologies Co.,Ltd. Its baseband part and radio part can be installed independently so that it can be used to various environments with wide coverage and low cost. Know the functions and features of DBS3900 Master the Hardware structure and function of DBS3900 Familiar with the Typical configuration and cable connection of DBS3900 Master the Network topologies of DBS3900

    ppt74p daihocdientu4 20-05-2013 144 14   Download

  • When you create a geodatabase, as you did in Exercise Add a database server to the Catalog tree and create a geodatabase, there is no data in it. You must add data to new geodatabases either by creating new datasets, importing data, or copying data from one geodatabase and pasting it into another. In this exercise, you will create a feature dataset, then import data from a personal geodatabase to populate it. You will also copy data from a file geodatabase and paste it into your new geodatabase. After the data is loaded, you will update the database statistics....

    pdf37p nhacsihuytuan 13-04-2013 78 3   Download

  • This paper introduces the notion of a stability condition on a triangulated category. The motivation comes from the study of Dirichlet branes in string theory, and especially from M.R. Douglas’s work on Π-stability. From a mathematical point of view, the most interesting feature of the definition is that the set of stability conditions Stab(D) on a fixed category D has a natural topology, thus defining a new invariant of triangulated categories.

    pdf30p noel_noel 17-01-2013 47 6   Download

  • Our approach to defining a security protocol for sensor networks is resource driven and factors in the trade offs between levels of security and the requisite power and computational resources. Primarily, we envision a scenario where a protected perimeter based on sensors is dynamically deployed. However, similar scenarios could be envisioned in an environment where the topology is well known in advance and the sensor network is pre- configured. Our operating paradigm is where data is reported to a computationally robust central location such as a base station or network controller....

    pdf4p khongmuonnghe 04-01-2013 88 2   Download

  • In this special feature, we examine how expected equity returns vary across a sample of globally active banks and over time in 11 countries. We estimate the determinants of the rate of return on bank stocks using a standard equity pricing framework that decomposes share price risk into a systematic and an idiosyncratic component. The systematic component cannot be diversified away, and it is priced in the market in the sense of commanding higher expected returns.

    pdf19p quaivattim 04-12-2012 36 1   Download

  • Each router has a full picture of the network topology, including bandwidth information for links to remote networks. Therefore, each router is able to independently select a loop-free and efficient pathway, based on cost, to reach every network in the area.

    pdf31p danhson1409 02-12-2010 65 6   Download

  • Link-State Routing Protocols. Objectives: Describe the basic features & concepts of link-state p routing protocols. Distance vector routing protocols are like road signs because routers must make preferred path decisions based on a distance or metric to a network. Link-state routing protocols are more like a road map because they create a topological map of the network and each router uses this map to determine the shortest path to each network. The ultimate objective is that every router receives all of the link-state information about all other routers in the routing area.

    pdf28p thanhtung_hk 05-11-2010 105 24   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2