Results 21 to 30 of about 11,841,471 (334)

RELIABILITY ANALYSIS OF COMPUTER NETWORKS USING PARAMETRIC FAILURE CRITERIA

open access: yesСтатистика и экономика, 2016
A mathematical model, which allows to obtain expressions for the determination of parameters of reliability of computer ne t w o rks co n sis t i n g o f i den t i c al recoverable elements.
Oleg A. Tkachev
doaj   +1 more source

Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj   +1 more source

IEEE Access special section editorial: Artificial intelligence enabled networking [PDF]

open access: yes, 2015
With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks.
Imran, Muhammad Ali   +4 more
core   +1 more source

Monitoring the Health of Computer Networks with Visualization - VAST 2012 Mini Challenge 1 Award: "Efficient Use of Visualization" [PDF]

open access: yes, 2012
The complex computer networks of large organisations contain many machines of many types, used in many geographic locations. Although system administrators should monitor the health of each machine, they need to do so within the context of the whole ...
Ahmed, N.   +5 more
core   +1 more source

Using Data Communication to Give Ease in Hotel Room Services

open access: yesComTech, 2011
Gaining extra comfort in a trip is an important factor. Staying in a hotel needs food, laundry, and other activities that can make guests comfortable. The guesses’ requests are usually ordered to the Room Service.
Rudi Tjiptadi
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

A Survey of Quantization Methods for Efficient Neural Network Inference [PDF]

open access: yesLow-Power Computer Vision, 2021
As soon as abstract mathematical computations were adapted to computation on digital computers, the problem of efficient representation, manipulation, and communication of the numerical values in those computations arose.
A. Gholami   +5 more
semanticscholar   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

Rethinking the Inception Architecture for Computer Vision [PDF]

open access: yesComputer Vision and Pattern Recognition, 2015
Convolutional networks are at the core of most state of-the-art computer vision solutions for a wide variety of tasks. Since 2014 very deep convolutional networks started to become mainstream, yielding substantial gains in various benchmarks.
Christian Szegedy   +4 more
semanticscholar   +1 more source

Computation in Gene Networks

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2001
Genetic regulatory networks have the complex task of controlling all aspects of life. Using a model of gene expression by piecewise linear differential equations we show that this process can be considered as a process of computation. This is demonstrated by showing that this model can simulate memory bounded Turing machines.
Siegelmann, Hava, Ben-Hur, Asa
openaire   +4 more sources

Home - About - Disclaimer - Privacy