منابع مشابه
KPI: A Security Infrastructure for Trusted Devices
Deployments of perhaps billions of autonomous, heterogeneous wireless devices, some fixed and some mobile, manufactured by different vendors, with varying capabilities, and very different purposes, but with one common feature that every device will have the ability to communicate with any other device are expected to organize themselves into pervasive, highly interconnected, ad hoc networks. Su...
متن کاملNetwork Security Based on Rough Set: A Review
As the conventional network security evaluation methods have prejudiced aspects when the weights of an evaluation indexes are recognized, it is not easy to make precise and objective evaluation. However, the Rough set theory has the benefits of not needing apriority information when dealing with tentative problems. Therefore, the appliance of the Rough set theory in the network security evaluat...
متن کاملDegree project Mobile Network Planning and KPI Improvement
Acknowledgement All praises to almighty Allah, whose enormous blessings give me strength and make me able to complete this thesis. I thank my honourable supervisor Mr. Rafiqul Matin for his kind support, and also honourable Dr. Sven-Erik Sandström for guidance throughout my thesis. His motivation was a source of inspiration for my thesis. Also thanks to Tele Talk Bangladesh Ltd. that provided t...
متن کاملUse of Ansoft to Model a Slice Magnetic Bearing
Maxwell 3D of Ansoft software were used for this study. Ansoft’s solutions are based on a more general program using Maxwell’s equations. A simple analysis has been done for calculating the magnetic force interacted between two magnets of similar poles facing each other. The modeling in Anosoft has been described.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Internet Technology Letters
سال: 2020
ISSN: 2476-1508,2476-1508
DOI: 10.1002/itl2.190