نتایج جستجو برای: telecommunication network
تعداد نتایج: 678545 فیلتر نتایج به سال:
چکیده ندارد.
Many real-world processes result in an extensive logs of sequences of events, i.e., events coupled with time of occurrence. Examples of such process logs include alarms produced by a large telecommunication network, web-access data, biostatistics, etc. In many cases, it is useful to decompose the incoming stream of events into the number of independent streams. Such decomposition may reveal val...
The current penetration, but also the huge potential, of Voice over IP (VoIP) telephony services in the market, boosts the competition among telecommunication service providers who promote new services through many different types of offers. However, this transition from the closed Public Switched Telephone Network (PSTN) architecture to the internet based VoIP services, has resulted in the int...
Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique ...
The telecommunications industry was one of the first to adopt data mining technology. This is most likely because telecommunication companies routinely generate and store enormous amounts of high-quality data, have a very large customer base, and operate in a rapidly changing and highly competitive environment. Telecommunication companies utilize data mining to improve their marketing efforts, ...
Providing stable compositions of Wireless Sensor Network Service (WSNS) is a challenging issue since the data stream architect often has only a limited control over the stability of the composed services. The architect can instead achieve stability by properly planning the data stream architecture. In this paper, we propose a formal approach which allows a data stream architect to perform stabi...
Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mech...
This paper looks at competition in the Telecommunication industry with non-linear tariffs and network based price discrimination where one of the networks has a relative advantage. We investigate profit-maximizing network pricing behaviour, in particular competitively chosen unregulated non-cooperative access prices at potentially asymmetric market equilibira.
هدف از انجام این تحقیق، بررسی و پیشنهاد الگوریتم های توزیع شده تخصیص نرخ و توزیع ترافیک بهینه بر مبنای تابع سودمندی در شبکه های بدون ارتباط می باشد. b. a. movsichoff ، الگوریتمی برای تخصیص نرخ و توزیع ترافیک بهینه در شبکه های بدون ارتباط ارائه داده است. در این الگوریتم، روش بهینه سازی مبتنی برکنترل غیرخطی برای بهینه سازی مسئله مهندسی ترافیک در شبکه های بدون ارتباط بکار رفته است. در الگوریتم ارا...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید