نتایج جستجو برای: network behavior

تعداد نتایج: 1249268  

Journal: :نشریه دانشکده فنی 0
علی عماری الهیاری حسن فرهنگی سید محمد مهدی هادوی

the effects of isothermal aging at temperatures between 550-850 ?c for durations of 1-100 h on microstructure, tensile properties, and impact fracture behavior of 316l austenitic stainless steel weld metal have been investigated. for this purpose, various techniques including metallographic observations, measurement of ferrite content using ferritscope, and fractographic investigations have bee...

Nahvi, Mehran, Salehi, Mahdi, Gharaei, Hamid , Sadeghian, Behzad,

In this research, artificial neural network (ANN) and genetic algorithm (GA) were used in order to produce and develop the NiAl intermetallic coating with the best wear behavior and the most value of hardness. The effect of variations of current, voltage and gas flow on the hardness and wear resistance were optimized by ANN and GA. In the following, the optimum  values of current, voltage and g...

The present research aims to conduct laboratory assessment on fatigue phenomenon in warm mix asphalt modified with nano-silica and including reclaimed asphalt pavement materials by the aid of review on self-healing behavior and measurement of validity of laboratory results by modeling via neural artificial network in neutral network of SPSS software. For this purpose, 2% weight of sasobit and 3...

Rate allocation has become a demanding task in data networks as diversity in users and traffics proliferate. Most commonly used algorithm in end hosts is TCP. This is a loss based scheme therefore it exhibits oscillatory behavior which reduces network performance. Moreover, since the price for all sessions is based on the aggregate throughput, losses that are caused by TCP affect other sessions...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

Abbas Arghavani, Abdorasoul Ghasemi

Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...

Journal: :international clinical neurosciences journal 0
mohammad ali ketabi faculty of dentistry, aja university of medical science, tehran, iran maryam shanavazi faculty of dentistry, aja university of medical science, tehran, iran farbod tondnevis faculty of biomedical engineering, amirkabir university of technology (tehran polytechnic), tehran, iran majid raz faculty of biomedical engineering, amirkabir university of technology (tehran polytechnic), tehran, iran hamid keshvari faculty of biomedical engineering, amirkabir university of technology (tehran polytechnic), tehran, iran mohsen shahrousvand department of polymer engineering and color technology, amirkabir university of technology, tehran, iran

regeneration and engineering of functional new tissues containing the neural network have great importance. progression of neural network into the dental tissue has a crucial role in dental tissue regeneration. in the present study polymer-ceramic blended scaffolds containing different weight percentages of carbon nanotube in poly caprolactone nanofiber matrix were fabricated. morphological, me...

Load side management is the basic and significant principle to keeping the balance between generation side and consumption side of electrical power energy. Load side management on typical medium voltage feeder is the power energy consumption control of connected loads with variation of essential parameters that loads do reaction to their variation. Knowing amount of load's reaction to each para...

As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...

2014
Ching-Hao Mao Chung-Jung Wu Evangelos E. Papalexakis Christos Faloutsos Kuo-Chen Lee Tien-Cheu Kao

What are the patterns that typical network attackers exhibit? For a given malicious network behaviors, are its attacks spread uniformly over time? In this work, we develop MalSpot, multi-resolution and multi-linear (Multi) network analysis system in order to discover such malicious patterns, so that we can use them later for attack detection, when attacks are concurrent with legitimate traffic....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید