Comparison of network simulators in IP networks
Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
Подобные документы
Shadow boxing – a type of training. Total automatization and gamification boxing pose. Investigating an action person. Recurrent convolutional networks for visual recognition. Corrections the performed action in program. Human pose estimation for boxing.
дипломная работа, добавлен 07.12.2019The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
статья, добавлен 20.01.2016- 103. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.
статья, добавлен 22.08.2021Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
презентация, добавлен 28.12.2013The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.
книга, добавлен 08.03.2014A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.
статья, добавлен 16.08.2022Research of the problem of training IT industry specialists, experience in teaching the basics of programming to educational applicants. Description of the Applied Technologies that contribute to the formation of competencies of IT industry specialists.
статья, добавлен 06.04.2023Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.
статья, добавлен 04.09.2024Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
статья, добавлен 23.05.2023Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.
статья, добавлен 23.02.2016Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.
диссертация, добавлен 30.09.2016The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.
презентация, добавлен 09.03.2016Develop a mechanism that identifies the line with Romanian chromatic words on the basis of computer technologies. The first phase of development of the dictionary meanings of poetic colors. Cooperation of linguists and specialists in informatics.
статья, добавлен 23.02.2016The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
статья, добавлен 10.10.2023The opportunities of the GeoGebra dynamic geometry environment. Capabilities of the system for creating drawings, tables of experimental data and their application in conducting research work. The examples of solving some elementary geometry problems.
статья, добавлен 25.05.2017Development new field of design - multimedia design. Communication of computer processes. Composition as a fundamental factor in the creation of multimedia products. Realization of the idea of project. Compositional organization of multimedia project.
статья, добавлен 10.05.2018- 123. Experiences of conducting online exam proctoring in low- resource settings: a Sri Lankan case study
Online proctoring techniques to prevent academic misconduct during online tests. The resources and requirements for the dissemination of online examinations in educational institutions in Sri Lanka. Ways to improve and spread online proctoring systems.
статья, добавлен 16.08.2023 Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.
дипломная работа, добавлен 02.05.2015Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.
статья, добавлен 29.10.2020