Application of the hot-spot evaluation method for monitoring of data center network
Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
Подобные документы
The place of neural network modeling of language units as an innovative tool for modern research. The value of linguistic units, the genesis of which can be traced thanks to the interaction of an artificial neural network with an array of text data.
??????, добавлен 04.09.2024?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
??????, добавлен 09.10.2018The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.
????????? ??????, добавлен 13.07.2020International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
?????, добавлен 08.03.2014Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.
??????, добавлен 30.10.2020Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
????????? ??????, добавлен 13.07.2020Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
??????, добавлен 11.03.2025Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.
??????, добавлен 08.12.2024Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.
?????, добавлен 19.03.2014Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023Application of cloud kitchen technologies and online delivery based on relevant network services in the work. Advantages of cloud kitchens compared to traditional restaurants, which include reducing the cost of the product by eliminating some services.
??????, добавлен 07.12.2024The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
??????????? ??????, добавлен 07.08.2017Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
??????, добавлен 25.03.2019Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
??????, добавлен 22.12.2016Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
??????, добавлен 27.12.2016- 16. Network topology
Study the ways in which computer systems or network devices connect to each other. Possibilities of using network topology. Features and issues of bus topology, star topology, ring topology, mesh topology, tree topology, daisy chain and hybrid topology.
???????, добавлен 11.10.2017 The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
??????, добавлен 29.09.2023??????? ??????? Data Mining, ??? ??????? ?????????????. ??????? ?????????????? ??????????. ????????? ??????????, ????????? ???????? ? Data Mining. ???????? ?????????? ??? ?????? ??????? ? 1960-? ?. Data Mining ??? ????? ????? ?????????????? ??????????.
???????, добавлен 14.01.2015The data collection algorithm to systematically track gender equality metrics across universities. The advantages of leveraging advanced scraping and analysis techniques to gather nuanced insights from diverse online data sources like university websites.
??????, добавлен 12.12.2024- 20. Big Data
??????????? ??????? "Big Data" ? ??? ?????????? ? ?????? ? ??????????? ????????? ?????? ? ?????????????? ???????. ??????????? ???????? ?????????? ????????? ?????????? ??????????. ???????? ??????? ???????? ?????? ? ?????????? Big Data ? ?????? ????????.
???????? ??????, добавлен 28.09.2015 The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
??????, добавлен 19.09.2024A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
??????, добавлен 15.09.2012Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
??????, добавлен 31.08.2022???????? ??????? "Big Data", ???????????? ??????? ???????? ???????? ?????? ??? ??????????????? ??????????????. ????? ? ???????? ???? ????????? Big Data ? ??????????? ???????????? ??????????? ?????? ? ???????? ?? ???????? ???????? ????????????? ??????????.
??????, добавлен 24.02.2025
