Results 71 to 80 of about 107,397 (277)

D-Link Comprehensive Training Solution for Networking Professionals

open access: yesСовременные информационные технологии и IT-образование, 2020
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov   +3 more
doaj   +1 more source

Implementation of Medical Information Exchange System Based on EHR Standard [PDF]

open access: yesHealthcare Informatics Research, 2010
ObjectivesTo develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems ...
Soon Hwa Han   +11 more
doaj   +1 more source

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data

open access: yes, 2017
Many systems are partially stochastic in nature. We have derived data driven approaches for extracting stochastic state machines (Markov models) directly from observed data.
Bao Ly Van   +18 more
core   +1 more source

Performance of a Deep Learning Algorithm for Melanoma Classification Across Diverse Dermoscopic and Tele‐Dermatology Datasets

open access: yesJEADV Clinical Practice, EarlyView.
ABSTRACT Background Early detection of melanoma significantly boosts patient survival rates. Deep learning has demonstrated dermatologist‐level accuracy in assessing pigmented skin lesions by analysing images at the pixel level. However, these neural networks may face challenges with ‘real‐life’ images due to limited training data and image artefacts ...
Marianne Zanchetta   +15 more
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG

open access: yesBaca: Jurnal Dokumentasi dan Informasi, 2020
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj   +1 more source

Web-traffic filtering system

open access: yesЛитьë и металлургия, 2022
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj   +1 more source

Vpn Firefox

open access: yes, 2020
PPTP At the present time the most common protocol vpn firefox is the protocol the two-point tunnel connection or a Point-to-Point Tunnelling Protocol - the PPTP. Developed it companies 3Com and Microsoft with the aim before the representation secure remote access to corporate networks via the Internet .
openaire   +1 more source

Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]

open access: yes, 2017
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq)   +1 more
core  

A general framework for product representations: bilattices and beyond

open access: yes, 2015
This paper studies algebras arising as algebraic semantics for logics used to model reasoning with incomplete or inconsistent information. In particular we study, in a uniform way, varieties of bilattices equipped with additional logic-related operations
Cabrer, L. M., Priestley, H. A.
core   +1 more source

Home - About - Disclaimer - Privacy