Application of the hot-spot evaluation method for monitoring of data center network
Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
Подобные документы
The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.
??????, добавлен 12.12.2024Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
??????, добавлен 25.03.2016Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.
??????, добавлен 14.01.2017?????? Data Mining: ???????????? ? ????????????????, ????????????? ? ?????????, ?????? ????????????? ??????, ?????????????. ???????????? ?????????? Data Mining. ??????????? ???????? ??????, ???? ?????????? ????????????????. ??????? ??????????? ??????.
???????????, добавлен 27.04.2023Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
????????? ??????, добавлен 02.09.2016Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
??????, добавлен 23.06.2016- 33. Express Mali
The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.
????????? ??????, добавлен 30.06.2015 The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
??????, добавлен 24.03.2016Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
????????? ??????, добавлен 23.09.2018??????? ?????????? Data Mining, ?? ??????? ????????. ??????? ??????????? ??????? ??? ???????????? ??????? OLAP ? Data Mining. ????? ?????, ????????? ? ?????. ?????????????? ???????? ??????-????????: ????????? ????????, ???????????????, ???????????.
???????, добавлен 30.04.2014???? ?????????? Data Mining - ??????????? ? ????? ???????????????, ??? ?? ?????? ???? ???????? ???????????? ????????. ???? ??????? (??????????? ?? ???????). ???????????? ??????? ? ?????????? Data Mining ??? ???????? ???????. ???????????? ?????? ?? ???.
???????, добавлен 22.07.2017A novel family of data-driven linear transformations, aimed at finding low dimensional embeddings of multivariate data, in a way that optimally preserves the structure of the data. The PCA and Fisher’s LDA are the special members in this transformation.
??????, добавлен 08.02.2013Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.
???????????, добавлен 13.06.2015To fulfill the need for such resources, farms must increase production rate. One of the aspects of farming that needs development is cattle identification. Current technology is applied by using tags, tattoos on cows to distinguish them from one another.
??????, добавлен 14.02.2025??????????? ?????????? Big Data ? ????????? ?? ??????? ??????????. ???????? ???????????? ?????????? Big Data, ??????? ????????, ?????? ?????????? ?? ????????? ???????? ?? ????????????. ?????? ???????????? ?? ?????????????? ?????????? ???????? ?????????.
??????, добавлен 14.12.2024The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
????????? ??????, добавлен 13.07.2020A network protocol as a specification for the format and relative timing of the messages exchanged. Formalizing why and how vulnerabilities occur in protocols. Previous models. Automated tools. Terminology relationships. A network time protocol exploit.
??????, добавлен 15.09.2012Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.
??????, добавлен 08.06.2024The search for patterns that are the basis for making effective managerial and technological decisions. Application of innovative technologies for the preparation, processing, analysis and analytics of extremely large arrays of heterogeneous data.
??????, добавлен 24.06.2024The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
??????, добавлен 18.09.2020Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
???????????? ??????, добавлен 13.02.2016The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.
????????? ??????, добавлен 13.09.2017The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
???????, добавлен 20.03.2016The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
??????, добавлен 06.05.2018
