Ваш любимый книжный интернет-магазин
Перейти на
GlavKniga.SU
Ваш город: Алматы
Ваше местоположение – Алматы
 Да 
От вашего выбора зависит время и стоимость доставки
Корзина: пуста
Авторизация 
  Логин
  
  Пароль
  
Регистрация  Забыли пароль?

Поиск по каталогу 
(строгое соответствие)
ISBN
Фраза в названии или аннотации
Автор
Язык книги
Год издания
с по
Электронный носитель
Тип издания
Вид издания
Отрасли экономики
Отрасли знаний
Сферы деятельности
Надотраслевые технологии
Разделы каталога
худ. литературы

Поиск по каталогу

найдено 1683 изданий (68 стр.) страницы: 1 ... 60 61 62 63 64 65 66 67 68
Вы ищете: Отрасли знаний: Интернет и локальные сети

Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Swapan Debbarma,Madhumita Debbarma and Amit Debnath
Energy Efficient Management MAC.
2013 г.,  88 стр.,  мягкий переплет
This book will develop the management skills in the field of Computer Network. That is the optimization resource usage with minimal input. The book contains the mainly on Wireless Sensor Networks (WSNs) as widely considered as one of the most important technologies for the twenty-first century. WSNs employ thousands of small sensors that...

24203 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Mazni Amil
PathF3 - Improved Accuracy in Bandwidth Estimation. Bandwidth Estimation
2013 г.,  132 стр.,  мягкий переплет
An increase consumption of bandwidth by networked applications has created the urge to have a measurement tool which is used to measure the available bandwidth, in order to maximize the usage of this limited resource. Internet Service Providers (ISP) requires this measurement tool to convince the subscribers about their Internet connection speed...

36414 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Akira Otsuki
Big Data Analysis.
2013 г.,  96 стр.,  мягкий переплет
This book is the technical book of "Big Data Analysis". This book has includeds Citation Analysis(Chapter 3-5), Clustering Analysis (Chapter3-5), the technology about Extraction of Key Papers From Clusters (Chapter3), Predicting Innovation Using Role Analysis of Key Nodes in clusters(Chapter4), Scientific Evaluation Index “O-Index" using...

24487 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Syed Baarrij
Comprehensive Network Capacity Monitoring Guideline (GSM and UMTS). A Practical Approach for Radio Engineers
2013 г.,  56 стр.,  мягкий переплет
This guide provides a comprehensive insight into understanding, monitoring and managing the capacity of GSM/UMTS networks. It is different from most sources of information on GSM and UMTS, as it provides a practical approach to engineers trying to measure and enhance the capacity of real-world networks. All of the major elements and interfaces of...

15323 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Rajabu Kitindi
Enabling Rural Population using ICT.
2013 г.,  88 стр.,  мягкий переплет
This book summaries efforts made in enhancing life of Rural Population through the use of Information and Communications Technology, part of ICT for Rural Development (ICT4RD) project. In this context, we will elaborate Telecommunications Systems Design and Implementations, Applications deployments, End user training & Capacity Building for...

31463 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Ashish Gupta
Parallel Algorithms for Prefix and Prefix Based Mathematical Equations. Design and Analysis
2013 г.,  88 стр.,  мягкий переплет
In this fast pace world we can see rapid revolutions in computer science whether it would be in telecommunication, smart phone devices or processors speed. When we talk about speed, Parallel computation comes in the picture. Implementation of Mathematical equations on different interconnection network is always been an interesting realm among...

24203 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Subir Biswas
Security and Privacy in Vehicular Ad hoc Networks. Establishing Security and Privacy in WAVE-enabled Vehicular Ad hoc Networks
2013 г.,  204 стр.,  мягкий переплет
Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, we address security, anonymity, and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications. VANET provides a variety of road-safety...

36067 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Aref Hassan Poor
Enhancement of DSDV Routing Protocol in Vehicular Ad Hoc Network. A new research on DSDV routing protocol improvement
2013 г.,  76 стр.,  мягкий переплет
This book reports on the research to enhance of a routing protocol to solve the problem of link breakage in DSDV which is a table-driven routing protocol, applied in Vehicular Ad Hoc networks. Due to high mobility in vehicular networks, link breakage is a problem in table-driven routing protocols which is cause of increasing delay time and packet...

23777 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Demian Antony D'Mello
QoS and Service Offer Driven Web Services Selection and Compositions.
2013 г.,  156 стр.,  мягкий переплет
Web Services currently is the main enabling technique to realize Service Oriented Architecture (SOA). This book provides brief introduction to the conceptual Web services architecture and brings out potential research issues related to non-functional property based Web service selection and compositions. The author provides Quality of Service...

37267 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Mohammad Uruj Jaleel
On Designing Energy Conserving WSN. Using Bio Inspired Computing
2013 г.,  168 стр.,  мягкий переплет
Sensors are low cost tiny devices with limited storage, computational capability and power. They can be deployed in large scale for performing both military and civilian tasks. The main concern in Wireless Sensor Networks is how to utilize the limited energy resources. The performance of Wireless Sensor Networks strongly depends on their lifetime....

42533 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Haitham ELwahsh
Secure Service Discovery Protocol for ad-hoc Networks "hash function".
2013 г.,  144 стр.,  мягкий переплет
Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies without communication infrastructure. This network may change rapidly and unpredictably. Application of ad hoc networks includes Academic Environment Applications, Health Care Applications, Military...

36840 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Hassan Farsi and Pouriya Etezadifar
Time Variable PDF Presented by Neural Network for data Compression.
2013 г.,  92 стр.,  мягкий переплет
In this book, first, we introduce Huffman coding and present some examples for more clarification. We then present Huffman problems in form of some examples. Next, we explain Probability Density Function (PDF) for a stream. Our aim in this chapter is to fit a function on probability density curve representing an information stream using artificial...

29185 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Shahmir Quidwai
Environmental Monitoring. For Server Rooms
2013 г.,  60 стр.,  мягкий переплет
Environmental monitoring devices are essential for all data or server rooms whether large or small. These devices are only being manufactured by international vendors and are very costly. The large data centers and organizations that can afford these devices use them for their data centers but small universities and schools, although in need, do...

21272 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Hamdy El-Sayed,Elnomery Zanaty and Ahmed Radwan
Wireless Ad-Hoc Networks and Some Location Based Routing Protocols.
2013 г.,  128 стр.,  мягкий переплет
the book studies the theoretical analysis of some characteristics in Ad Hoc Networks. It consists of two parts. In the first part, we describe a number of characteristics in Ad Hoc Network with a dynamic topology like the neighbour nodes, the area of the Ad Hoc Network, number of nodes, node density, and area of transmission.the second part...

33368 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Shahnawaz Husain,S. C. Gupta and R. C. Joshi
Intrusion Detection Engine for Adhoc Environment.
2013 г.,  120 стр.,  мягкий переплет
Most existent protocols, applications and services for mobile Adhoc networks (MANETs) assume a cooperative and friendly network environment and do not accommodate security. In MANETs, intrusion prevention (IPS) and intrusion detection (IDS) techniques need to complement each other to guarantee a highly secure environment. The IPS and IDS play...

30180 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Rob Juffermans
Diverse routing in SRLG networks.
2013 г.,  64 стр.,  мягкий переплет
As our dependency on communication increases so is the demand for protecting these communication lines. To provide failure-safe connections in optical net- works, lightpaths can be protected. Protected lightpaths consist of a primary path and a backup path which are disjoint and ensure connection continuity in case of a single link failure....

21414 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Pallavi Kaliyar and Gagan Singla
A secure routing protocol for MANETs against byzantine attacks.
2013 г.,  84 стр.,  мягкий переплет
Security in MANETs is always a very big issue. With evolution of wireless prevalence in the last decade, we are witnessing more and more applications moving and adapting to wireless methods to communicate. But as the financial applications approaches the wireless communication the need of security raised basically MANET nodes rely on multi-hop...

28901 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Ramesh Dharavath,Chiranjeev Kumar and Amit Kumar Jain
Atomicity And Snapshot Isolation On Column Oriented Databases. A Transaction approach
2013 г.,  52 стр.,  мягкий переплет
This is a non-mathematical introduction to Atomicity and Snapshot Isolation on Column-Oriented Databases explaining the fundamental concepts of this emerging technology. Each unit in this script addresses de-facto standards and design approaches towards transaction. With its highly details pedagogy entailing examples, figures,and algorithms, this...

20988 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Sanping Li
Towards Ultra-High Speed Online Network Traffic Classification. Enhanced with Machine Learning Algorithms and OpenFlow Accelerators
2013 г.,  200 стр.,  мягкий переплет
Ultra-high speed networks require real-time traffic classification in order to identify the presence of certain network applications and utilize network resources to ensure these applications run smoothly. Machine learning provides a promising alternative for traffic classification based on statistical flow features, avoiding raising privacy and...

40281 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Divya Sharma
Hash Based Data Text Fusion using Speech Signal Algorithm. Hiding Text Data File in a Speech Signal
2013 г.,  120 стр.,  мягкий переплет
Digital Steganography is the process of hiding a message in a cover signal. This book shows the various technique available for hiding text data in a speech signal. The process of hiding digital data(such as speech, text, and image) in a Speech Signal is called Speech Steganography. This book i have also discusses the differences between...

30180 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Ashit Kumar Dutta and Abdul Rahaman Wahab Sait
Computer Networks from Scratch. A New Approach
2013 г.,  324 стр.,  мягкий переплет
In the world of technology, computer networks became a medium for communication between people and machines. Internet runs on the top of the computer networks.In this field, security become more necessary because most of the money transactions are happening through Internet.we have covered from basic ideas of the computer networks to modern...

55817 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Shaffali Gupta and Sanmeet Kaur
A GUI Framework for detecting Intrusions using Bro IDS.
2013 г.,  76 стр.,  мягкий переплет
Network security is the provision made in an underlying computer network or rules made by the administrator to protect the network and its resources from unauthorized access. To make network secure, an Intrusion detection system is one of the efficient system. Bro is an open source Network Intrusion Detection System that monitors network traffic,...

21841 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Bineet Kumar Joshi
A Comprehensive Study of Performance of MANET in Ricean Channel Model. An Analytical Approach
2013 г.,  136 стр.,  мягкий переплет
Mobile Ad hoc Networks or MANETs are networks in which multiple nodes, each possessing a wireless transceiver, from a network among them via peer-to-peer communication. There has been significant research activity over the past 5-10 years into performance of such networks with the view to develop more efficient and robust communication protocols....

33652 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Chi Liu
Cross-Layer Designs for Multi-Hop Wireless Networks.
2013 г.,  188 стр.,  мягкий переплет
Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The distributed nature of such networks makes them suitable for a variety of applications where there are no...

41355 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Satarupa Chakraborty,Subarna Laha and Ankana Dhar
GSM Security Using Elliptic Curve Cryptography.
2013 г.,  164 стр.,  мягкий переплет
Elliptic curve cryptography , a new and most improved cryptographic algorithm of the era. This book concern about how efficiently one can imposed this algorithm in GSM network. Unlike any wired telephone network GSM is most widely used telephone network in which security is always a great issue. So this book contains detailed discussion about RSA...

40503 тг
Бумажная версия
найдено 1683 изданий (68 стр.) страницы: 1 ... 60 61 62 63 64 65 66 67 68