نتایج جستجو برای: network operating system
تعداد نتایج: 2793382 فیلتر نتایج به سال:
the main objective of this study is the modelling and optimization of an industrial hydrocracker unit (hu) by means of adaptive neuro fuzzy inference system (anfis) model. in this case, some data were collected from an industrial hydrocracker plant. inputs of an anfis include flow rate of fresh feed and recycle hydrogen, temperature of reactors, mole percentage of h2 and h2s, feed flow rate and...
In this article, the effect of operating conditions, such as temperature, Gas Hourly Space Velocity (GHSV), CH4/O2 ratio and diluents gas (mol% N2) on ethylene production by Oxidative Coupling of Methane (OCM) in a fixed bed reactor at atmospheric pressure was studied over Mn/Na2WO4/SiO2 ca...
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In these courses, students learn how to design, implement, analyze, test, and operate a system or a network to achieve security. Pedagogical research has shown that effective laboratory exercises are critically important to...
a multi objective honey bee mating optimization (hbmo) designed by online learning mechanism is proposed in this paper to optimize the double fuzzy-lead-lag (fll) stabilizer parameters in order to improve low-frequency oscillations in a multi machine power system. the proposed double fll stabilizer consists of a low pass filter and two fuzzy logic controllers whose parameters can be set by the ...
A growing class of sensor network applications require high data rates and computationally-intensive node-level processing. When deployed into environments where resources are limited and variable, achieving good performance requires applications to adjust their behavior as resource availability changes. This paper presents Pixie, a new sensor network operating system designed to facilitate the...
Nowadays, computer networks play an important role in our daily live, and the widely use of computer networks are for accessing the internet. The network administrator has a full ability to control all access types to network, and tasked to allow or discard some of the connections. By using Snort Intrusion Detection System (IDS), the network administrator can monitor network access from the sen...
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In these courses, students learn how to design, implement, analyze, test, and operate a system or a network to achieve security. Pedagogical research has shown that effective laboratory exercises are critically important to...
Distributed computing systems have received considerable attention in the last decade. Unfortunately, current research efforts are often restricted to homogeneous environments. There seems to be little attention for real-world installations, where heterogeneity is mostly the rule, rather than the exception. The Distributed Academic Computing Network Operating System, DACNOS for short, presents ...
With the rapid development of new forms and concepts of networked and mobile computing, it is increasingly clear that operating systems must evolve so that all machines in a given network, even the Internet, can appear to be controlled by the same operating system. As a result, the world-wide interconnected networks, commonly called the Internet or the Web, could potentially be supported and ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید