
Uses of computer networks
-
Convolutional operations on neural networks are computationally intensive tasks that require significant processing time due to their reliance on calculations from multiplication circuits. This study implements and evaluates the performance of the XNOR-popcount design at the transistor-level on the Cadence circuit design software using 90nm CMOS technology.
9p
viinuzuka
28-02-2025
1
1
Download
-
The paper describes a new architecture for 3D visualization service, made to convert 2D CAD data into comprehensive 3D models. It is created with focus on multi-device environments in industrial uses.
8p
viyamanaka
06-02-2025
2
2
Download
-
Bài giảng Computer Networks 1 (Mạng Máy Tính 1): Lecture 1 - Introduction to Computer Networks bao gồm những nội dung về Uses of Computer Networks, Business Applications of Networks, Home Network Applications, Mobile Network Users, Network Hardware.
58p
cocacola_17
09-12-2015
95
4
Download
-
Objective: Identify organizations responsible for WAN standards Explain the difference between a WAN and LAN and the type of addresses each uses; describe the role of a router in a WAN Identify internal components of the router and describe their functions; describe the physical characteristics of the router.
96p
xaydungk23
19-04-2016
87
8
Download
-
Lecture Basic network management: Chapter 3 - Network computer. After studying this chapter you will be able to understand: What is a Network? Why we use a Network? Advantages of LAN Types of Network.
25p
nhanmotchut_3
20-10-2016
67
2
Download
-
In this study, MCS is applied to compute the reliability of the nodes and the network under uncertain demand and roughness, and to determine how reliability is distributed among the various nodes of WDN, as well as assessing the reliability of the network as a series or parallel system. The effect of the resilience index on the nodal and network reliability is also assessed.
199p
runthenight05
01-03-2023
10
3
Download
-
This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.
123p
runthenight07
01-03-2023
6
4
Download
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p
runthenight04
02-02-2023
8
2
Download
-
In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.
55p
tamynhan0
04-07-2020
16
3
Download
-
(BQ) This paper reports an intelligent approach for process modeling and optimization of electric discharge machining (EDM). Physics based process modeling using finite element method (FEM) has been integrated with the soft computing techniques like artificial neural networks (ANN) and genetic algorithm (GA) to improve prediction accuracy of the model with less dependency on the experimental data.
13p
xuanphuongdhts
27-03-2017
59
2
Download
-
Module 3 - Resolving names. This module provides you with the knowledge and skills to assign computer names to the IP addresses of the source and destination hosts, and then use the computer name to contact the hosts.
20p
nomoney2
10-02-2017
66
3
Download
-
Research objectives: Studying and evaluation of active queue management mechanisms to find out the advantages and disadvantages of each mechanism, in order to classify and evaluate application performance for mechanisms and using fuzzy logic to improve active queue management mechanism; the results of the first goals is to perform study motivation first and will be the foundation for the theory and simulation improvements of the thesis.
31p
change03
06-05-2016
60
4
Download
-
Chapter summary: Computers have a variety of ports, some of which are implemented by the motherboard and others by expansion cards; computers use many different types of connectors fortheir various interfaces, and in some cases the same connector type can provide different functions; SCSI host adapters can use any one of several types of connectors, which are not interchangeable;...
16p
tangtuy08
21-04-2016
38
4
Download
-
Due to the unavoidable nonbiological variations accompanying many experiments, it is imperative to consider a way of unravelling the functional interaction structure of a cellular network (e.g. signalling cascades or gene networks) by using the qualitative information of time-series experimental data instead of computation through the measured absolute values.
10p
fptmusic
11-04-2013
50
3
Download
-
High-quality quantitative data generated under standardized conditions is critical for understanding dynamic cellular processes. We report strategies for error reduction, and algorithms for automated data processing and for establishing the widely used techniques of immunoprecipitation and immu-noblotting as highly precise methods for the quantification of protein levels and modifications.
12p
dell39
27-03-2013
54
3
Download
-
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.
18p
muathu_102
28-01-2013
59
6
Download
-
The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems
19p
muathu_102
28-01-2013
51
4
Download
-
Upon completing this lesson, you will be able to: Describe the features and operation of OSPF Use Cisco IOS commands to configure dynamic routing for a single area OSPF network, given a functioning router Use show and debug commands to identify anomalies in dynamic routing operation using OSPF, given an operational router
15p
trinhvang
25-01-2013
52
8
Download
-
Upon completing this lesson, you will be able to: Describe the features and operation of EIGRP Use Cisco IOS commands to configure dynamic routing using EIGRP, given a functioning router Use show and debug commands to identify anomalies in dynamic routing operation using EIGRP, given an operational router
12p
trinhvang
25-01-2013
59
8
Download
-
Upon completing this lesson, you will be able to: Describe the features and operation of IGRP Use Cisco IOS commands to configure dynamic routing using IGRP, given a functioning router Use show and debug commands to identify anomalies in dynamic routing operation using IGRP, given an operational router
19p
trinhvang
25-01-2013
43
4
Download
CHỦ ĐỀ BẠN MUỐN TÌM
