Uses of computer networks
-
This paper is structured as follows. The following section presents related work. Section 3 summarizes the characteristics of the two datasets utilized in the model and the system’s overall architecture for image-based disease diagnosis. Section 4 provides our experimental results that compare the performance metrics with other studies.
6p viengfa 28-10-2024 2 2 Download
-
Currently, machine learning not only solves simple problems such as object classification but also machine learning is widely applied in the field of computer vision such as identification systems, object detection, and modules in the authentication system, intelligent processing algorithms such as automatic driving, chatbot, etc.
14p viyoko 01-10-2024 1 1 Download
-
In this paper, we study an integration of temperature and pH sensors into the system to collect and monitor water quality parameters in aquaculture using a combination of edge computing (EC), Artificial Intelligence (AI) and Internet-of-Things (IoT). We develop and deploy a model using edge computing and a Long-Short Term Memory (LSTM) algorithm to forecast the aquaculture water quality at the network's edge.
6p vikwong 29-09-2024 2 1 Download
-
This paper is aimed at quickly predicting the dynamic behavior of functionally graded plates using nontraditional computational approaches consisting of artificial neural networks (ANN) and extreme gradient boosting (XGBoost).
11p vifaye 20-09-2024 3 1 Download
-
In this study, MCS is applied to compute the reliability of the nodes and the network under uncertain demand and roughness, and to determine how reliability is distributed among the various nodes of WDN, as well as assessing the reliability of the network as a series or parallel system. The effect of the resilience index on the nodal and network reliability is also assessed.
199p runthenight05 01-03-2023 9 3 Download
-
This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.
123p runthenight07 01-03-2023 5 4 Download
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p runthenight04 02-02-2023 7 2 Download
-
Tài liệu giảng dạy Tiếng Anh chuyên ngành Công nghệ thông tin (English for Information Technology) gồm có những nội dung chính sau: Unit 1 computer uses; unit 2 types of computer; unit 3 keyboard and mouse; unit 4 input devices; unit 5 output devices; unit 6 storage devices; unit 7 networks. Mời các bạn cùng tham khảo để biết thêm nội dung chi tiết.
41p runordie10 09-10-2022 77 10 Download
-
Tài liệu giảng dạy Tiếng Anh chuyên ngành Công nghệ thông tin (English for Information Technology) được biên soạn gồm 7 units, cụ thể như sau: Unit 1: Computer uses, unit 2: Types of computer, unit 3: Keyboard and mouse, unit 4: Input devices, unit 5: Output devices, unit 6: Storage devices, unit 7: Networks. Mời các bạn cùng tham khảo.
41p runordie10 09-10-2022 35 7 Download
-
Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. Since SDN is regarded as a new research issue, the application of SDN in practice faces some barriers. Most network devices such as routers and switches that implement SDN functionalities are expensive. An alternative solution in SDN research and experiments is to use network emulators. By using Mininet, an open source network emulator, this study simulates SDN implementations in different environments.
13p nguaconbaynhay10 19-02-2021 28 2 Download
-
This paper proposes a new approach which combines different classifiers in order to make best use of each classifier. To build the new model, we evaluate the accuracy and performance (training and testing time) of three classification algorithms: ID3, Naitive Bayes and SVM.
8p tamynhan8 04-11-2020 14 3 Download
-
In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.
55p tamynhan0 04-07-2020 13 3 Download
-
This paper proposes the perceptual organization model to perform the above task. This paper addresses the outdoor scene segmentation and object classification using cluster based perceptual organization. Perceptual organization is the basic capability of the human visual system is to derive relevant grouping and structures from an image without prior knowledge of its contents.
25p byphasse043256 24-03-2019 27 1 Download
-
In this paper, a novel method is presented to detect spam content on the web. It is based on classification and employs an idea from biology, namely, danger theory, to guide the use of different classifiers. The evaluation of content features of WEBSPAM-UK2007 data set using 10-fold cross-validation demonstrates that this method provides high evaluation criteria in detecting web spam.
13p byphasse043256 23-03-2019 27 1 Download
-
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.
7p byphasse043256 23-03-2019 31 1 Download
-
The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths.
22p thuyliebe 05-10-2018 75 2 Download
-
A comparison between three methods applied to parallel robot control namely: Computed torque controller, sliding mode control and sliding mode control using neural networks is presented in this paper. The simulation results show that PD control method is only accurate when model parameters are precisely identified.
11p dieutringuyen 07-06-2017 50 6 Download
-
(BQ) This paper reports an intelligent approach for process modeling and optimization of electric discharge machining (EDM). Physics based process modeling using finite element method (FEM) has been integrated with the soft computing techniques like artificial neural networks (ANN) and genetic algorithm (GA) to improve prediction accuracy of the model with less dependency on the experimental data.
13p xuanphuongdhts 27-03-2017 56 2 Download
-
Module 2: Automating an installation of Microsoft Windows XP Professional. The following topics are covered in this module: Introduction to automating an installation of Windows XP Professional; creating answer files; creating a uniqueness database file; performing an automated installation of Windows XP Professional; overview of creating and deploying an image; preparing a reference computer; creating, testing, and deploying an image; managing security settings by using security center.
42p nomoney2 10-02-2017 46 3 Download
-
Module 3 - Resolving names. This module provides you with the knowledge and skills to assign computer names to the IP addresses of the source and destination hosts, and then use the computer name to contact the hosts.
20p nomoney2 10-02-2017 63 3 Download