History of Telecommunications
Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
Подобные документы
Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
книга, добавлен 08.03.2014Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
презентация, добавлен 06.02.2019The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.
презентация, добавлен 24.11.2016Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016- 31. MultiNeuron - Neural Networks Simulator For Medical, Physiological, and Psychological Applications
The neural software in medicine to investigate and diagnose immune deficiencies; diagnose and study allergic and pseudoallergic reactions; forecast emergence or aggravation of stagnant cardiac insufficiency in patients with cardiac rhythm disorders.
статья, добавлен 08.02.2013 This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014Анализ технологий широкополосного абонентского доступа на основе PLC (Power Line Communications). Технологические предпосылки внедрения PLC-решений. Обзор предложений поставщиков оборудования про систем PLC класса In-Door. Варианты исполнения PLC-сетей.
курсовая работа, добавлен 19.06.2018- 34. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
статья, добавлен 03.12.2020 Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.
статья, добавлен 04.09.2024Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.
статья, добавлен 27.09.2016International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014The laptop as a portable personal computer, in the case of which combined typical PC components, including display, keyboard, and the device instructions and the battery. Active matrix display technology and color screens. Wireless: Enabler for Mobility.
реферат, добавлен 08.04.2015Обзор Web-технологий, основные модели организаций сайта: линейная, решетка, иерархия, модель паутины. Основы разметки HTML. Объекты клиента, браузера, history, frame и др. Функция соединения с сервером баз данных, функция обработки результатов запроса.
методичка, добавлен 04.05.2015The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.
статья, добавлен 22.08.2021Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
дипломная работа, добавлен 13.07.2020Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.
статья, добавлен 12.02.2019The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.
статья, добавлен 22.09.2022Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
книга, добавлен 08.03.2014Definition of the concept "сybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
презентация, добавлен 24.01.2017The state research and pioneer computers. Data Processing Industry аnd Market Until. Calculators in French State Research. The Computer Industry: companies’ behaviour, strategies and the component problem. A client for the Semiconductor Industry.
статья, добавлен 18.11.2018Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016Artificial intelligence as a factor of ecosystem growth in the context of technological, ontological, anthropological dimensions. AI as a resource for use in all sectors of the socio-economic sphere, its convergence in the form of ontological dimensions.
статья, добавлен 20.09.2024