• No se han encontrado resultados

Network topology

TítuloNet Net AutoML selection of artificial neural network topology for brain connectome prediction

TítuloNet Net AutoML selection of artificial neural network topology for brain connectome prediction

... examples and 20 features. Twelve linear and non-linear Machine Learning classifiers were tested and the best classification model was provided by Random Forest (50 trees) with the mean test AUROC of 0.9991 ± 0.0001 ...

13

Contact network topology in tapped granular media

Contact network topology in tapped granular media

... the network is composed of 512 ...the network leads to dramatic changes in the number of polygons, without having an impact on the density of the ...

9

Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks

Sensitivity Analysis of Checkpointing Strategies for Multimemetic Algorithms on Unstable Complex Networks

... this, the mean availability stint per node is about 90%·kn iterations. We therefore obtain scenarios ranging from rather low (k = 20) churn up to extremely high (k = 1) churn. To analyze the sensitivity of the checkpoint ...

8

Protecting Contextual Information in WSNs: Source- and Receiver-Location Privacy Solutions

Protecting Contextual Information in WSNs: Source- and Receiver-Location Privacy Solutions

... the network implies many-to-one communications, where any sensor node is a potential sender and the base station is the only ...the network topology but, as aforementioned, this problem is related to ...

252

Some experiences in using virtual machines for teaching computer networks

Some experiences in using virtual machines for teaching computer networks

... local network topology and privileged access to the operating system ...for network teaching ...own network experiment, using the appropriate topology, and thus not disturbing the other ...

12

Lab – Subnetting Network Topologies (Instructor Version)

Lab – Subnetting Network Topologies (Instructor Version)

... a network topology, it is important to be able to determine the number of subnets ...base network address and mask. You will subnet the network address and provide an IP addressing scheme that ...

9

Lab – Configuring Basic RIPv2 and RIPng (Instructor Version)

Lab – Configuring Basic RIPv2 and RIPng (Instructor Version)

... the network topology with RIPv2 routing, disable automatic summarization, propagate a default route, and use CLI commands to display and verify RIP routing ...the network topology with IPv6 ...

21

A multilevel modular dc dc converter topology

A multilevel modular dc dc converter topology

... The choice of the frequency for the compensation AC voltage component is a trade-off between converter losses and capacitor requirements, measured in terms of energy storage, hence physical size of capacitors. The higher ...

25

Lab – Configuring a Point-to-Point GRE VPN Tunnel (Instructor

Lab – Configuring a Point-to-Point GRE VPN Tunnel (Instructor

... In this lab, you will configure an unencrypted point-to-point GRE VPN tunnel and verify that network traffic is using the tunnel. You will also configure the OSPF routing protocol inside the GRE VPN tunnel. The ...

16

Lab - Troubleshooting ACL Configuration and Placement

Lab - Troubleshooting ACL Configuration and Placement

... Other network related traffic, such as EIGRP, is allowed from outside ...corporate network to prevent malicious network attacks from outside ...

13

TOWER: Topology Optimization for netWork Enhanced Resilience

TOWER: Topology Optimization for netWork Enhanced Resilience

... To do so, first we need to perform an exhaustive enumeration of the states the system could be at. Since the computational cost of this enumeration process can exceed the time requirements of the platform, clustering ...

9

TítuloReliability based design and topology optimization of aerospace components and structures

TítuloReliability based design and topology optimization of aerospace components and structures

... Performing optimization in the design of stiffened composite panels may be trouble- some given that several variables of different natures may be involved, such as geom- etry dimensions or stacking sequences of the ...

258

Equivariant Poincaré series and topology of valuations

Equivariant Poincaré series and topology of valuations

... Equivariant topology of germs of plane curves seems to be much more involved than the usual (non-equivariant) ...equivariant topology of a collection of curves always determines the equiv- ariant Poincar´e ...

16

TítuloMinimum weight with stress constraints
topology optimization

TítuloMinimum weight with stress constraints topology optimization

... However, since Bendse and Kikuchi proposed the basic concepts [5] in 1988, most of topology structural optimization problems have been routinely stated in terms of minimum compliance (maximum stiffness) ...

14

Celsius Network

Celsius Network

... Celsius Network which has made a breakthrough in the Celsius development ...a network, meeting the needs of users and operators that belong to the participants Institutions members of ...Celsius ...

5

• Network marketing

• Network marketing

... Y es precisamente esta otra Macro-tendencia la que ha llevado a la madurez del Network Marketing, "corriendo la voz" y creando redes mundiales de personas e información en todos los rincones del globo. ...

7

A model of the topology of the bank – firm credit network and its role as channel of contagion

A model of the topology of the bank – firm credit network and its role as channel of contagion

... The last few years have seen a surge of interest in the properties of the in- terbank market and formal modelling of interbank connections via models and methods of network theory. The major motivation for the ...

37

On power law reachability analysis at an autonomous system granularity

On power law reachability analysis at an autonomous system granularity

... The best example for this kind of routing is the hot potato. This means that every incoming packet is duplicated and sent to every outgoing link available in a node (except the incoming link). As we can notice, an ...

72

Lab - Configuring VLANs and Trunking (Instructor Version)

Lab - Configuring VLANs and Trunking (Instructor Version)

... the topology, assign VLANs to switch access ports, verify that VLANs are working as expected, and then create a VLAN trunk between the two switches to allow hosts in the same VLAN to communicate through the trunk, ...

20

Lab – Designing and Implementing IPv4 Addressing with VLSM

Lab – Designing and Implementing IPv4 Addressing with VLSM

... The Variable Length Subnet Mask (VLSM) was designed to help conserve IP addresses. With VLSM, a network is subnetted and then subnetted again. This process can be repeated multiple times to create subnets of ...

12

Show all 1393 documents...

Related subjects