Статті в журналах з теми "Configured networks"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Configured networks.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Configured networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Merrill, John W. L., and Robert F. Port. "Fractally configured neural networks." Neural Networks 4, no. 1 (January 1991): 53–60. http://dx.doi.org/10.1016/0893-6080(91)90031-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Повний текст джерела
Анотація:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Baek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (July 7, 2021): 6280. http://dx.doi.org/10.3390/app11146280.

Повний текст джерела
Анотація:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Miyoshi, Naoto, and Tomoyuki Shirai. "A Cellular Network Model with Ginibre Configured Base Stations." Advances in Applied Probability 46, no. 03 (September 2014): 832–45. http://dx.doi.org/10.1017/s0001867800007394.

Повний текст джерела
Анотація:
Stochastic geometry models for wireless communication networks have recently attracted much attention. This is because the performance of such networks critically depends on the spatial configuration of wireless nodes and the irregularity of the node configuration in a real network can be captured by a spatial point process. However, most analysis of such stochastic geometry models for wireless networks assumes, owing to its tractability, that the wireless nodes are deployed according to homogeneous Poisson point processes. This means that the wireless nodes are located independently of each other and their spatial correlation is ignored. In this work we propose a stochastic geometry model of cellular networks such that the wireless base stations are deployed according to the Ginibre point process. The Ginibre point process is one of the determinantal point processes and accounts for the repulsion between the base stations. For the proposed model, we derive a computable representation for the coverage probability—the probability that the signal-to-interference-plus-noise ratio (SINR) for a mobile user achieves a target threshold. To capture its qualitative property, we further investigate the asymptotics of the coverage probability as the SINR threshold becomes large in a special case. We also present the results of some numerical experiments.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Miyoshi, Naoto, and Tomoyuki Shirai. "A Cellular Network Model with Ginibre Configured Base Stations." Advances in Applied Probability 46, no. 3 (September 2014): 832–45. http://dx.doi.org/10.1239/aap/1409319562.

Повний текст джерела
Анотація:
Stochastic geometry models for wireless communication networks have recently attracted much attention. This is because the performance of such networks critically depends on the spatial configuration of wireless nodes and the irregularity of the node configuration in a real network can be captured by a spatial point process. However, most analysis of such stochastic geometry models for wireless networks assumes, owing to its tractability, that the wireless nodes are deployed according to homogeneous Poisson point processes. This means that the wireless nodes are located independently of each other and their spatial correlation is ignored. In this work we propose a stochastic geometry model of cellular networks such that the wireless base stations are deployed according to the Ginibre point process. The Ginibre point process is one of the determinantal point processes and accounts for the repulsion between the base stations. For the proposed model, we derive a computable representation for the coverage probability—the probability that the signal-to-interference-plus-noise ratio (SINR) for a mobile user achieves a target threshold. To capture its qualitative property, we further investigate the asymptotics of the coverage probability as the SINR threshold becomes large in a special case. We also present the results of some numerical experiments.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (December 2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

CHIU, CHINCHUAN, and MICHAEL A. SHANBLATT. "HUMAN-LIKE DYNAMIC PROGRAMMING NEURAL NETWORKS FOR DYNAMIC TIME WARPING SPEECH RECOGNITION." International Journal of Neural Systems 06, no. 01 (March 1995): 79–89. http://dx.doi.org/10.1142/s012906579500007x.

Повний текст джерела
Анотація:
This paper presents a human-like dynamic programming neural network method for speech recognition using dynamic time warping. The networks are configured, much like human’s, such that the minimum states of the network’s energy function represent the near-best correlation between test and reference patterns. The dynamics and properties of the neural networks are analytically explained. Simulations for classifying speaker-dependent isolated words, consisting of 0 to 9 and A to Z, show that the method is better than conventional methods. The hardware implementation of this method is also presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mitra, J., and C. Singh. "Capacity assistance distributions for arbitrarily configured multi-area networks." IEEE Transactions on Power Systems 12, no. 4 (1997): 1530–35. http://dx.doi.org/10.1109/59.627853.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhao, Yongli, Jie Zhang, Dahai Han, Lei Wang, Wanyi Gu, and Yuefeng Ji. "Routing on pre-configured topology for dynamic optical networks." Photonic Network Communications 17, no. 3 (August 27, 2008): 299–310. http://dx.doi.org/10.1007/s11107-008-0164-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mohamed, Nader, and Jameela Al-Jaroodi. "Self-configured multiple-network-interface socket." Journal of Network and Computer Applications 33, no. 1 (January 2010): 35–42. http://dx.doi.org/10.1016/j.jnca.2009.07.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Thirunavukkarasu, V., A. Senthil Kumar, P. Prakasam, and G. Suresh. "Lifetime Maximization for 5G Mobile Networks Using Secured and Finest Optimal Routing Protocol." Journal of Nanoelectronics and Optoelectronics 16, no. 11 (November 1, 2021): 1791–96. http://dx.doi.org/10.1166/jno.2021.3139.

Повний текст джерела
Анотація:
The lifetime enhancement of any 5G Wireless Networks is essential to increase the efficacy and also the network performance. Hence, to enhance the lifetime, identifying a reliable routing protocol is the major challenge in any wireless network. In this proposed research, combined optimization technique named Secured and Finest Optimal Routing (SFOR) protocol is proposed to increase the network lifetime. Therefore, the given scenario is configured as Software Defined Network (SDN) which will configure the network dynamically for efficient management. Three scenario’s of the routing problem is arrived once, the routing of the mobile node is unidentified to derive a SFOR for maximizing the network lifetime. The arrived three scenario’s are mathematically modeled as Linear Programming (LP) problem and the problems are resolved utilizing the source node routing strategies. In this research work, the planned SFOR procedure is deployed in addition efficacy is associated through the reported methods. It is detected that the projected SFOR procedure increases the era of the network is 16% and 50% as compared with Virtual Ad hoc Routing Protocol and Path Collection constructed on Trust Protocol respectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (April 2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.

Повний текст джерела
Анотація:
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Taskaya-Temizel, T., M. C. Casey, and K. Ahmad. "Pre-processing inputs for optimally-configured time-delay neural networks." Electronics Letters 41, no. 4 (2005): 198. http://dx.doi.org/10.1049/el:20058016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Al-Noman, Ahmad Ali. "Analysis and evaluation of survivability of various configured communication networks." International Journal of Communication Systems 11, no. 5 (September 1998): 305–10. http://dx.doi.org/10.1002/(sici)1099-1131(199809/10)11:5<305::aid-dac362>3.0.co;2-o.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Partzsch, Johannes, Christian Mayr, Massimiliano Giulioni, Marko Noack, Stefan Hänzsche, Stefan Scholze, Sebastian Höppner, Paolo Del Giudice, and Rene Schüffny. "Mean Field Approach for Configuring Population Dynamics on a Biohybrid Neuromorphic System." Journal of Signal Processing Systems 92, no. 11 (June 27, 2020): 1303–21. http://dx.doi.org/10.1007/s11265-020-01556-9.

Повний текст джерела
Анотація:
Abstract Real-time coupling of cell cultures to neuromorphic circuits necessitates a neuromorphic network that replicates biological behaviour both on a per-neuron and on a population basis, with a network size comparable to the culture. We present a large neuromorphic system composed of 9 chips, with overall 2880 neurons and 144M conductance-based synapses. As they are realized in a robust switched-capacitor fashion, individual neurons and synapses can be configured to replicate with high fidelity a wide range of biologically realistic behaviour. In contrast to other exploration/heuristics-based approaches, we employ a theory-guided mesoscopic approach to configure the overall network to a range of bursting behaviours, thus replicating the statistics of our targeted in-vitro network. The mesoscopic approach has implications beyond our proposed biohybrid, as it allows a targeted exploration of the behavioural space, which is a non-trivial task especially in large, recurrent networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Stuart Holmes Rosenthal, David. "Architectural choices in LOCKSS networks." Library Hi Tech 32, no. 1 (March 11, 2014): 2–10. http://dx.doi.org/10.1108/lht-09-2013-0120.

Повний текст джерела
Анотація:
Purpose – The LOCKSS digital preservation technology collects, preserves and disseminates content in peer-to-peer networks. Many such networks are in use. The Global LOCKSS Network (GLN) is an open network with many nodes in which libraries preserve academic journals and books that they purchase. The CLOCKSS network is a closed network, managed by a non-profit consortium of publishers and libraries to form a dark archive of e-journal content. There are also many Private LOCKSS Networks (PLNs) preserving various genres of content. Each of these networks is configured to meet the specific requirements of its community and the content it preserves. This paper seeks to address these issues. Design/methodology/approach – This paper describes these architectural choices and discusses a development that could enable other configurations. Findings – Third-party rights databases would allow hosted LOCKSS networks. Practical implications – Hosted LOCKSS networks would be cheaper. Originality/value – Reducing cost of digital preservation is important in a time of strained library budgets.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Wong, K. D., A. Dutta, J. Burns, R. Jain, K. Young, and H. Schulzrinne. "A multilayered mobility management scheme for auto-configured wireless IP networks." IEEE Wireless Communications 10, no. 5 (October 2003): 62–69. http://dx.doi.org/10.1109/mwc.2003.1241103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Wiratama, Ichsan, and Putu Sugiartawan. "Peningkatan Keamanan Wireless Pada Jaringan Komputer di Universitas Amikom Menggunakan Protokol IEEE802.1X." Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) 2, no. 1 (September 30, 2019): 155–64. http://dx.doi.org/10.33173/jsikti.50.

Повний текст джерела
Анотація:
The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks. To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

GRAMMATIKAKIS, MILTOS D., ERIC FLEURY, and MIRO KRAETZL. "CONTINUOUS ROUTING IN PACKET SWITCHES." International Journal of Foundations of Computer Science 09, no. 02 (June 1998): 121–37. http://dx.doi.org/10.1142/s0129054198000106.

Повний текст джерела
Анотація:
Considering continuous routing, we analyze the transient behavior of n×n routers with input buffering, split input buffering, output buffering, and central buffering with dedicated virtual circuits, one for each source-destination pair in a network. Assuming similar buffer space requirements, output buffering has the highest throughput. Split input buffering and central buffering have comparable performance; split input buffering slightly outperforms central buffering for large switches. Input buffering is known to saturate at packet generating rates above 0.586. By extending these models, two 1024-node, unique-path multistage networks configured with (approximately-modeled) input buffered STC104 32×32 switches, or central buffered Telegraphos 4×4 switches (Telegraphos I version) are compared. Surprisingly, the network configured with smaller switches performs better. This is due to the higher peak bandwidth of the Telegraphos switch and saturation of the input buffered STC104 switch.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

K, Kumaravel, and Sengaliappan M. "Performance routing with shortest path exploration in wireless mesh networks." Kongunadu Research Journal 7, no. 1 (April 15, 2020): 50–53. http://dx.doi.org/10.26524/krj.2020.8.

Повний текст джерела
Анотація:
In wireless mesh network the nodes are dynamically self-organized and self- configured networks create a changing topology and keep a mesh connectivity to offer Internet access to the users. The shortest path problem is one of the most fundamental problems in networking. This problem can be solved by manytechniques and algorithm. In this paper we find the shortest path by using the fittest nodes in the network. By using the fittest node we can send the packets to the destination without packet loss, delay in packets.Average end to end delay is decreased by increasing bandwidth and the results are shown.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Crainic, Teodor Gabriel, Beatrice Di Chiara, Maddalena Nonato, and Luciano Tarricone. "Tackling electrosmog in completely configured 3G networks by parallel cooperative meta-heuristics." IEEE Wireless Communications 13, no. 6 (December 2006): 34–41. http://dx.doi.org/10.1109/mwc.2006.275196.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Val Ledesma, Jorge, Rafał Wisniewski, and Carsten Skovmose Kallesøe. "Smart Water Infrastructures Laboratory: Reconfigurable Test-Beds for Research in Water Infrastructures Management." Water 13, no. 13 (July 5, 2021): 1875. http://dx.doi.org/10.3390/w13131875.

Повний текст джерела
Анотація:
The smart water infrastructures laboratory is a research facility at Aalborg University, Denmark. The laboratory enables experimental research in control and management of water infrastructures in a realistic environment. The laboratory is designed as a modular system that can be configured to adapt the test-bed to the desired network. The water infrastructures recreated in this laboratory are district heating, drinking water supply, and waste water collection systems. This paper focuses on the first two types of infrastructure. In the scaled-down network the researchers can reproduce different scenarios that affect its management and validate new control strategies. This paper presents four study-cases where the laboratory is configured to represent specific water distribution and waste collection networks allowing the researcher to validate new management solutions in a safe environment. Thus, without the risk of affecting the consumers in a real network. The outcome of this research facilitates the sustainable deployment of new technology in real infrastructures.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Kameda, Hisao, Jie Li, and Eitan Altman. "Optimal Routing for Multiclass Networks." Advances in Operations Research 2011 (2011): 1–21. http://dx.doi.org/10.1155/2011/645954.

Повний текст джерела
Анотація:
Overall optimal routing is considered along with individually optimal routing for networks with nodes interconnected in a generally configured manner and with multiple classes of users. The two problems are formulated, and we discuss the mutual equivalence between the problems, the existence and uniqueness of solutions, and the relation between the formulations with path and link flow patterns. We show that a link-traffic loop-free property holds within each class for both individually and overall optimal routing for a wide range of networks, and we show the condition that characterizes the category of networks for which the property holds.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Roka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.

Повний текст джерела
Анотація:
The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. Signature-based Intrusion Detection System matches network packets against a pre-configured set of intrusion signatures. Current implementations of IDS employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded technique would allow more efficient and scalable exploitation of these multi-processor machines.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Saleh, Zahraa, and Qahhar Qadir. "The Downside of Software-Defined Networking in Wireless Network." UKH Journal of Science and Engineering 4, no. 2 (December 31, 2020): 147–56. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp147-156.

Повний текст джерела
Анотація:
Mobile traffic volumes have grown exponentially because of the increase in services and applications. Traditional networks are complex to manage because the forwarding, control, and management planes are all bundled together and, thus, administrators are supposed to deploy high-level policies, as each vendor has its own configuration methods. Software-Defined Networking (SDN) is considered the future paradigm of communication networks. It decouples control logic from its underlying hardware, thereby promoting logically centralized network control and making the network more programmable and easy to configure. Low-power wireless technologies are moving toward a multitenant and multiapplication Internet of Things (IoT), which requires an architecture with scalable, reliable, and configured solutions. However, employing an SDN-based centralized architecture in the environment of a low-power wireless IoT network introduces significant challenges, such as difficult-to-control traffic, unreliable links, network contention, and high associated overheads that can significantly affect the performance of the network. This paper is a contribution toward a performance evaluation for the use of SDN in wireless networking by evaluating the latency, packet drop ratio (PDR), data extraction rate (DER), and overheads. The results show that SDN adds a high percentage of overheads to the network, which is about 43% of the 57% user packets, and the DER drops when the number of mesh nodes are increased, in addition to the high loss that was observed for packets that traveled over more hops.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Whatmore, Sarah, and Lorraine Thorne. "Elephants on the Move: Spatial Formations of Wildlife Exchange." Environment and Planning D: Society and Space 18, no. 2 (April 2000): 185–203. http://dx.doi.org/10.1068/d210t.

Повний текст джерела
Анотація:
In this paper we explore tensions between the notions and spaces of social agency mobilised in actant network theory and feminist science studies by focusing on their implications for the status and treatment of nonhuman animals, in this case the African elephant. The notion of a spatial formation of wildlife exchange (SFWE) is deployed to trace the diverse modalities and spatialities of social networks in which such creatures are caught up and the ways in which these practical orderings work through the bodies of elephants, both in the sense of their energies being variously transduced and of their experiences being reconfigured in the process. These themes are pursued through two contemporary global networks of wildlife conservation/science. The first, characterised as a mode of ordering of foresight, is a network concerned with ‘captive breeding’ and configured through the coding and exchange of computerised information on the lineages and breeding properties of animals held in zoological collections worldwide. The second, characterised as a mode of ordering of authenticity, is a network concerned with ‘in-situ’ conservation projects and configured through the recruitment of paying volunteers, corporate donors, and field scientists to a global programme of research expeditions. Our account traces three simultaneous moments in the patterning of elephants in each network—as virtual bodies, as bodies in place, and as living spaces.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Evglevskaya, N. V., A. I. Paramonov, P. I. Smirnov, and R. V. Shamilova. "Software Defined Network architecture model and cognitive control method for organizing multiple access in the Internet of Things." Radio industry 28, no. 4 (November 27, 2018): 68–75. http://dx.doi.org/10.21778/2413-9599-2018-28-4-68-75.

Повний текст джерела
Анотація:
The study has the method of random multiple wireless access in the networks of the Internet of Things and the control architecture, similar to a software-configured network, examined. The models of collision description, network parameters selection and their initial values, which provide target values for the probability of the delivery in the considered networks, are analyzed. The paper proposes a method the novelty of which lies in the usage of cognitive control of network parameters, taking into account the heterogeneity of conditions for different users with a given probability of data delivery. The proposed method and model of random multiple access and cognitive selection of network parameters are relevant and can be applied when building the access level of the Internet of Things in networks with allowable losses when managing large volumes of heterogeneous traffic and ensuring the required quality of service.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Ruela, André Siqueira, Raquel da Silva Cabral, André Luiz Lins Aquino, and Frederico Gadelha Guimarães. "Memetic and Evolutionary Design of Wireless Sensor Networks Based on Complex Network Characteristics." International Journal of Natural Computing Research 1, no. 2 (April 2010): 33–53. http://dx.doi.org/10.4018/jncr.2010040103.

Повний текст джерела
Анотація:
This work proposes the design of wireless sensor networks using evolutionary algorithms based on complex network measures. In this paper, the authors develop heuristic approaches based on genetic and memetic algorithms for finding a network configuration based on two complex network measures, the average shortest path length, and the cluster coefficient. The work begins with the mathematical model of the hub allocation problem, developed to determine the nodes that will be configured as hubs. This model was adopted within the basic and the hybrid genetic algorithm, and results reveal that the methodology allows the configuration of networks with more than a hundred nodes where some complex network measures are observed in the physical communication layer. The energy consumption and the delay could be reduced when a tree based routing is built over this physical layer.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Kalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.

Повний текст джерела
Анотація:
Abstract The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Huang, Shanguo, Bingli Guo, Xin Li, Jie Zhang, Yongli Zhao, and Wanyi Gu. "Pre-configured polyhedron based protection against multi-link failures in optical mesh networks." Optics Express 22, no. 3 (January 28, 2014): 2386. http://dx.doi.org/10.1364/oe.22.002386.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Sebbah, Samir, and Brigitte Jaumard. "Design of survivable WDM networks using pre-configured protection structures with unrestricted shapes." Photonic Network Communications 19, no. 1 (August 28, 2009): 9–21. http://dx.doi.org/10.1007/s11107-009-0206-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Murakami, Masaya, Daichi Kominami, Kenji Leibnitz, and Masayuki Murata. "Reliable Design for a Network of Networks with Inspiration from Brain Functional Networks." Applied Sciences 9, no. 18 (September 11, 2019): 3809. http://dx.doi.org/10.3390/app9183809.

Повний текст джерела
Анотація:
In realizing the network environment assumed by the Internet-of-Things, network slicing has drawn considerable attention as a way to enhance the utilization of physical networks (PNs). Meanwhile, slicing has been shown to cause interdependence among sliced virtual networks (VNs) by propagating traffic fluctuations from one network to others. However, for interconnected networks with mutual dependencies, known as a network of networks (NoN), finding a reliable design method that can cope with environmental changes is an important issue that is yet to be addressed. Some NoN models exist that describe the behavior of interdependent networks in complex systems, and previous studies have shown that an NoN model based on the functional networks of the brain can achieve high robustness, but its application to dynamic and practical systems is yet to be considered. Consequently, this paper proposes the Physical–Virtual NoN (PV-NoN) model assuming a network-slicing environment. This model defines an NoN availability state to deal with traffic fluctuations and interdependence among a PN and VNs. Further, we assume three basic types of interdependence among VNs for this model. Simulation experiments confirm that the one applying complementary interdependence inspired by brain functional networks achieves high availability and communication performance while preventing interference among the VNs. Also investigated is a method for designing a reliable network structure for the PV-NoN model. To this end, the deployment of network influencers (i.e., the most influential elements over the entire network) is configured from the perspective of intra/internetwork assortativity. Simulation experiments confirm that availability or communication performance is improved when each VN is formed assortatively or disassortatively, respectively. Regarding internetwork assortativity, both the availability and communication performance are improved when the influencers are deployed disassortatively among the VNs.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Menendez, R. C., and M. O. Vogel. "A star-configured fiber-to-the-curb system." International Journal of Digital & Analog Communication Systems 3, no. 1 (1990): 55–65. http://dx.doi.org/10.1002/dac.4510030111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Taniguchi, Yoshiaki, Hiroaki Tsutsumi, Nobukazu Iguchi, and Kenzi Watanabe. "Design and Evaluation of a Proxy-Based Monitoring System for OpenFlow Networks." Scientific World Journal 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/6513649.

Повний текст джерела
Анотація:
Software-Defined Networking (SDN) has attracted attention along with the popularization of cloud environment and server virtualization. In SDN, the control plane and the data plane are decoupled so that the logical topology and routing control can be configured dynamically depending on network conditions. To obtain network conditions precisely, a network monitoring mechanism is necessary. In this paper, we focus on OpenFlow which is a core technology to realize SDN. We propose, design, implement, and evaluate a network monitoring system for OpenFlow networks. Our proposed system acts as a proxy between an OpenFlow controller and OpenFlow switches. Through experimental evaluations, we confirm that our proposed system can capture packets and monitor traffic information depending on administrator’s configuration. In addition, we show that our proposed system does not influence significant performance degradation to overall network performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Garrison, Philip, Esther Han Beol Jang, Michael A. Lithgow, and Nicolás Andrés Pace. ""The Network Is an Excuse": Hardware Maintenance Supporting Community." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–20. http://dx.doi.org/10.1145/3479608.

Повний текст джерела
Анотація:
The global community networking movement promotes locally-managed network infrastructure as a strategy for affordable Internet connectivity. This case study investigates a group of collectively managed WiFi Internet networks in Argentina and the technologists who design the networking hardware and software. Members of these community networks collaborate on maintenance and repair and practice new forms of collective work. Drawing on Actor-Network Theory, we show that the networking technologies play a role in the social relations of their maintenance and that they are intentionally configured to do so. For technology designers and deployers, we suggest a path beyond designing for easy repair: since every breakdown is an opportunity to learn, we should design for accessible repair experiences that enable effective collaborative learning.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

BINNS, M. D., F. J. CLOUGH, and S. C. J. GARTH. "AN ARCHITECTURE FOR FULLY INTEGRATED LARGE SCALE NEURAL NETWORKS." International Journal of Neural Systems 04, no. 04 (December 1993): 327–32. http://dx.doi.org/10.1142/s0129065793000262.

Повний текст джерела
Анотація:
To apply neural networks to many engineering applications, large networks will be required. Such networks are difficult to build using standard crystalline silicon technology due to limitations in both the fabrication and packaging processes. An architecture is proposed where amorphous silicon photoresistors are used to store the synaptic weights. A single plate of amorphous silicon is able to contain up to 100 million photoresistors, exploiting readily available fabrication technology. Using an external light source, each photoresistor can be individually adjusted allowing them to be configured as programmable fixed-value resistors. The processing compatibility of polysilicon and amorphous silicon allows the same glass substrate to be used for large-area integration of the photosensors, the analogue neural network and the neurons. The integration of the photosensors and the rest of the network may be used to alleviate the interface problem at the inputs resulting in a design with a very simple architecture that is both elegant and simple to fabricate. This paper describes such a design in which amorphous silicon technology is applied to neural network hardware.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (November 8, 2021): 283. http://dx.doi.org/10.3390/fi13110283.

Повний текст джерела
Анотація:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Cana, Erion. "Comparative Performance Simulation of DSDV AODV and DSR MANET Protocols in NS2." International Journal of Business & Technology 2, no. 1 (May 2013): 24–31. http://dx.doi.org/10.33107/ijbte.2013.2.1.4.

Повний текст джерела
Анотація:
Mobile Ad hoc Networks (MANET) are self-configured and infrastructure less networks with autonomous mobile nodes. Due to the high flexibility, these kind of networks are heavily used in rescue operations, military missions etc. Many routing protocols for this kind of networks exist. This article presents a comparative and quantitative performance study of DSDV, AODV and DSR routing protocols using different simulation models in NS2. Performance metrics like PDR, E2E Delay and Throughput are analyzed under varying network, traffic and mobility parameters like number of nodes, traffic flows, mobility speed and pause time. Results show that AODV outperforms DSDV and DSR in all the performance metrics. DSDV performs better than DSR in terms of PDR and E2E delay. DSR gives 20-30 higher Throughput than DSDV. Performance metrics are highly influenced by network topology parameters like number of nodes and number of traffic flow connections. Mobility parameters like speed and pause time have slight impact on performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Kim, Inhwan, Hyunmi Yoo, Eom Young-Hyun, Sungguk Cho, and Byungkook Jeon. "A Mutual Awareness Mechanism of Inter-MVFs (Mobile Virtual Fences) to Support Connected Car Service." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 106. http://dx.doi.org/10.14419/ijet.v7i3.33.18585.

Повний текст джерела
Анотація:
In this paper, we present a mutual awareness mechanism among lots of MVFs(Mobile Virtual Fences) to configure Connected cars service in VANETs(Vehicular Ad hoc Networks). If the MVFs, as our previous researches, mounted on each car are recognized and constructed to each other, the service environment of connected car can be configured and simulated. So it is necessary to have a mechanism that the moving MVFs automatically detect according to the speed. The proposed mutual awareness mechanism is implemented by exchanging messages among inter-MVFs based on context-aware computing. As a result, when the MVFs are mutually recognized, they are basically simulated in a connected car service. Therefore, in the future, the proposed mechanism will be contribute to improve the reliability, safety, and efficiency in the era of autonomous vehicles.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Sha, Chenmin, and Shidong Zhou. "Activity detection for enhanced configured-grant: A practical perspective." China Communications 19, no. 3 (March 2022): 181–91. http://dx.doi.org/10.23919/jcc.2022.03.013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Wu, Chyuan-Tyng, Peter van Beek, Phillip Schmidt, Joao Peralta Moreira, and Thomas R. Gardos. "Evaluation of semi-frozen semi-fixed neural network for efficient computer vision inference." Electronic Imaging 2021, no. 17 (January 18, 2021): 213–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.17.avm-213.

Повний текст джерела
Анотація:
Deep neural networks have been utilized in an increasing number of computer vision tasks, demonstrating superior performance. Much research has been focused on making deep networks more suitable for efficient hardware implementation, for low-power and low-latency real-time applications. In [1], Isikdogan et al. introduced a deep neural network design that provides an effective trade-off between flexibility and hardware efficiency. The proposed solution consists of fixed-topology hardware blocks, with partially frozen/partially trainable weights, that can be configured into a full network. Initial results in a few computer vision tasks were presented in [1]. In this paper, we further evaluate this network design by applying it to several additional computer vision use cases and comparing it to other hardware-friendly networks. The experimental results presented here show that the proposed semi-fixed semi-frozen design achieves competitive performanc on a variety of benchmarks, while maintaining very high hardware efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

M., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (January 20, 2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.

Повний текст джерела
Анотація:
Mobile Ad hoc Network is a self-configured network, the main responsibility faced in the network is security. Malicious nodes are mostly to blame for the insecurity of MANET. The malicious attacker nodes will disrupt the overall functioning of the network, and many security solution approaches are utilized for safe and reliable communication in MANET to stop such harmful activity. This routing, known as Hybrid Trust Cluster based Multiple Routing (H-TCMR), helps to minimize the amount of messages carried inside the network, lowering the network's total energy usage. It utilizes Hybrid Time Division Multiple Access (HTDMA) for time slots and the Unified Slot Assignment Protocol (USAP) for cluster allocation. Using Hybrid Rider Optimization Algorithm (HROA) approaches, a group of riders will drive together to a specified location in order to obtain the cluster head slot. The suggested approach encrypts the data before sending it to its final destination. It also helps to extend the life of mobile networks. Some of the factors considered in simulation studies include connection, energy, average delay, throughput, as well as overall cluster quality. The simulation result demonstrates a performance study of HTCMR's dependable security, as well as increased system efficiency and improved data transfer security.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Liu, Yong, Baohua Liang, and Jiabao Jiang. "Information Processing and Data Management Technology in Wireless Sensor Networks." International Journal of Online Engineering (iJOE) 14, no. 09 (September 30, 2018): 66. http://dx.doi.org/10.3991/ijoe.v14i09.8270.

Повний текст джерела
Анотація:
<p>The wireless sensor network is essentially a data-centric network that processes the continuous stream of data, which is collected by different sensors. Therefore, the existing data management technologies regard the wireless sensor network, which is named WSN as a distributed database, and it is composed of continuous data streams from the physical world. Wireless sensor networks are emerging next-generation sensor networks, but their transmission of information is highly dependent. The wireless sensor network processes the continuous stream of data collected by the sensor. Based on the features of wireless sensor networks, this paper presents a topology-dependent model of cluster evolution with fault tolerance. Through the limited data management, resources have reasonably configured, while also saving energy. The model is based on the energy-aware routing protocol in its network layer protocols. The key point is the energy routing principle. According to its own local view, the cluster head node builds the inter-cluster topology to achieve fault-tolerant and energy-saving goals. Simulation results show that the model has good fault tolerance and energy efficiency.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Suresh Babu, Kolluru, and Srikanth Vemuru. "A Low-Cost Software Defined Radio Based Cognitive Radio Test-Bed for LTE Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 51. http://dx.doi.org/10.14419/ijet.v7i3.1.16797.

Повний текст джерела
Анотація:
In this work, we present a low-cost implementation of a Cognitive Radio (CR) test-bed for LTE and LTE-Advanced (LTE-A) Networks. The test-bed setup is implemented using highly integrated Software Defined Radio (SDR) platforms which are well suited for wireless communication. Each transceiver can be configured to work as a primary (resp. secondary) eNodeB or a primary (resp. secondary) user in a Heterogeneous Cognitive Radio framework. In this context, we study the problem of spectrum management in an LTE based heterogeneous network and propose simple distributed algorithms which the secondary eNodeB can employ to efficiently manage the spectral opportunities that arise in such a network. Experimental validation show significant improvement in the secondary link throughput.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Lin, Szu-Hsien, Tzu-Pu Chang, Huei-Hwa Lai, and Zi-Ying Lu. "Do Social Networks of Listed Companies Help Companies Recover from Financial Crises?" Sustainability 14, no. 9 (April 22, 2022): 5044. http://dx.doi.org/10.3390/su14095044.

Повний текст джерела
Анотація:
This study aims to examine how the social networks of top management affect the recovery of their companies when facing a financial crisis. We mainly use the logit and Cox regression models to investigate whether social networks help overcome the financial distress and shorten the crisis duration. The empirical findings suggest that companies with characteristics of low degree centrality of the chairman’s bank networks and high closeness centrality of the general manager’s general networks and bank networks are more likely to overcome financial distress and get back to normal status. Furthermore, for companies with characteristics of low degree centrality of the chairman’s personal general networks, low closeness centrality of the financial executive’s personal general networks, and high degree centrality of the financial executive’s personal bank networks, it was easier to shorten the crisis duration. The practical implication is that companies need to prioritize quality over quantity in order to survive or shorten the crisis. All company top managers should not look only at the size of the company but consider how the social network is configured.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Byeon, Yeong-Hyeon, and Keun-Chang Kwak. "Pre-Configured Deep Convolutional Neural Networks with Various Time-Frequency Representations for Biometrics from ECG Signals." Applied Sciences 9, no. 22 (November 10, 2019): 4810. http://dx.doi.org/10.3390/app9224810.

Повний текст джерела
Анотація:
We evaluated electrocardiogram (ECG) biometrics using pre-configured models of convolutional neural networks (CNNs) with various time-frequency representations. Biometrics technology records a person’s physical or behavioral characteristics in a digital signal via a sensor and analyzes it to identify the person. An ECG signal is obtained by detecting and amplifying a minute electrical signal flowing on the skin using a noninvasive electrode when the heart muscle depolarizes at each heartbeat. In biometrics, the ECG is especially advantageous in security applications because the heart is located within the body and moves while the subject is alive. However, a few body states generate noisy biometrics. The analysis of signals in the frequency domain has a robust effect on the noise. As the ECG is noise-sensitive, various studies have applied time-frequency transformations that are robust to noise, with CNNs achieving a good performance in image classification. Studies have applied time-frequency representations of the 1D ECG signals to 2D CNNs using transforms like MFCC (mel frequency cepstrum coefficient), spectrogram, log spectrogram, mel spectrogram, and scalogram. CNNs have various pre-configured models such as VGGNet, GoogLeNet, ResNet, and DenseNet. Combinations of the time-frequency representations and pre-configured CNN models have not been investigated. In this study, we employed the PTB (Physikalisch-Technische Bundesanstalt)-ECG and CU (Chosun University)-ECG databases. The MFCC accuracies were 0.45%, 2.60%, 3.90%, and 0.25% higher than the spectrogram, log spectrogram, mel spectrogram, and scalogram accuracies, respectively. The Xception accuracies were 3.91%, 0.84%, and 1.14% higher than the VGGNet-19, ResNet-101, and DenseNet-201 accuracies, respectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Ma, Chen, Jie Zhang, Yongli Zhao, Jian Yuan, Zilian Jin, Xin Li, Shanguo Huang, and Wanyi Gu. "Pre-configured prism (p-Prism) method against simultaneous dual-link failure in optical networks." Optical Fiber Technology 20, no. 5 (October 2014): 443–52. http://dx.doi.org/10.1016/j.yofte.2014.05.005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Perlicki, Krzysztof, Mirosław Siergiejczyk, and Marek Stawowy. "Reliability monitoring of broadband access networks." Journal of KONBiN 42, no. 1 (June 1, 2017): 273–82. http://dx.doi.org/10.1515/jok-2017-0029.

Повний текст джерела
Анотація:
AbstractOne of the critical issues for broadband accesss is how to test the access network infrastructure and quality of optical signal. The installation and powering up of an optical fiber access networks requires measurement techniques for verifying the link has been configured properly and that its constituent components are functioning correctly. Maintenance functions for a broadband optical access network are classified in two main categories: preventive maintenance and post-fault maintenance. The first one consists of: surveillance (to detect degradation in optical fiber components, or any other anomalous condition not preventing the signal transmission,), testing (to measure and locate any detected degradation or anomalous condition) and control (fiber identification and fiber transfer to allow the testing of the link.). In turn second one consisits of: surveillance (to detect alarms or trouble reports and activate a procedure for restoration), testing (to locate the fault and/or verify the carrier performances after the restoration) and remedy (fiber identification, fiber repair or fiber transfer to restore the link).
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Jiang, Jiaqi, and Jonathan A. Fan. "Multiobjective and categorical global optimization of photonic structures based on ResNet generative neural networks." Nanophotonics 10, no. 1 (September 22, 2020): 361–69. http://dx.doi.org/10.1515/nanoph-2020-0407.

Повний текст джерела
Анотація:
AbstractWe show that deep generative neural networks, based on global optimization networks (GLOnets), can be configured to perform the multiobjective and categorical global optimization of photonic devices. A residual network scheme enables GLOnets to evolve from a deep architecture, which is required to properly search the full design space early in the optimization process, to a shallow network that generates a narrow distribution of globally optimal devices. As a proof-of-concept demonstration, we adapt our method to design thin-film stacks consisting of multiple material types. Benchmarks with known globally optimized antireflection structures indicate that GLOnets can find the global optimum with orders of magnitude faster speeds compared to conventional algorithms. We also demonstrate the utility of our method in complex design tasks with its application to incandescent light filters. These results indicate that advanced concepts in deep learning can push the capabilities of inverse design algorithms for photonics.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Băncioiu, Camil, and Remus Brad. "Analyzing Markov Boundary Discovery Algorithms in Ideal Conditions Using the d-Separation Criterion." Algorithms 15, no. 4 (March 23, 2022): 105. http://dx.doi.org/10.3390/a15040105.

Повний текст джерела
Анотація:
This article proposes the usage of the d-separation criterion in Markov Boundary Discovery algorithms, instead of or alongside the statistical tests of conditional independence these algorithms usually rely on. This is a methodological improvement applicable when designing, studying or improving such algorithms, but it is not applicable for productive use, because computing the d-separation criterion requires complete knowledge of a Bayesian network. Yet Bayesian networks can be made available to the algorithms when studied in controlled conditions. This approach has the effect of removing sources of suboptimal behavior, allowing the algorithms to perform at their theoretical best and providing insights about their properties. The article also discusses an extension of this approach, namely to use d-separation as a complement to the usual statistical tests performed on synthetic datasets in order to ascertain the overall accuracy of the tests chosen by the algorithms, for further insights into their behavior. To exemplify these two approaches, two Markov Boundary Discovery algorithms were used, namely the Incremental Association Markov Blanket algorithm and the Iterative Parent–Child-Based Search of Markov Blanket algorithm. Firstly, these algorithms were configured to use d-separation alone as their conditional independence test, computed on known Bayesian networks. Subsequently, the algorithms were configured to use the statistical G-test complemented by d-separation to evaluate their behavior on synthetic data.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії