Results 71 to 80 of about 107,397 (277)
D-Link Comprehensive Training Solution for Networking Professionals
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov +3 more
doaj +1 more source
Implementation of Medical Information Exchange System Based on EHR Standard [PDF]
ObjectivesTo develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems ...
Soon Hwa Han +11 more
doaj +1 more source
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
Many systems are partially stochastic in nature. We have derived data driven approaches for extracting stochastic state machines (Markov models) directly from observed data.
Bao Ly Van +18 more
core +1 more source
ABSTRACT Background Early detection of melanoma significantly boosts patient survival rates. Deep learning has demonstrated dermatologist‐level accuracy in assessing pigmented skin lesions by analysing images at the pixel level. However, these neural networks may face challenges with ‘real‐life’ images due to limited training data and image artefacts ...
Marianne Zanchetta +15 more
wiley +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj +1 more source
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj +1 more source
PPTP At the present time the most common protocol vpn firefox is the protocol the two-point tunnel connection or a Point-to-Point Tunnelling Protocol - the PPTP. Developed it companies 3Com and Microsoft with the aim before the representation secure remote access to corporate networks via the Internet .
openaire +1 more source
Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq) +1 more
core
A general framework for product representations: bilattices and beyond
This paper studies algebras arising as algebraic semantics for logics used to model reasoning with incomplete or inconsistent information. In particular we study, in a uniform way, varieties of bilattices equipped with additional logic-related operations
Cabrer, L. M., Priestley, H. A.
core +1 more source

