نتایج جستجو برای: computer terminal

تعداد نتایج: 721998  

2005

The hidden terminal is classified as the sending hidden terminal and receiving hidden terminal in this paper. The quantitive analysis of hidden terminal problem and simulation-based analysis of its mechanism is discussed. Through the extensive ns2 simulations the detail comparison for the impact of sending hidden terminal and receiving hidden terminal to the performance of TCP is also given. Th...

Journal: :Perform. Eval. 2004
Yonghuan Cao Hairong Sun Kishor S. Trivedi

Capacity-on-demand is the key concept in multiplexing bursty mobile data traffic over wireless links featuring limited bandwidth. This scheme maintains a connection for a mobile only when it has data to transfer and allows quick release of radio resource when buffered data is emptied. For a system supporting a large number of data mobiles, non-trivial multiple access delay may be introduced and...

Journal: :Reliability Engineering & System Safety 2022

Various real-life applications, for example, Internet of Things, wireless sensor networks, smart grids, transportation communication social and computer grid systems, are usually modeled as network structures. The binary-state composed (e.g., functioning or failed) components (arcs and/or nodes) is one the most popular two-terminal reliability a success probability that still can be calculated ...

Journal: :international journal of business and development studies 0

this study analyses the concept of cost functions for semi-automated straddle carrier (sc), rubber tyred gantry (rtg) and automated rail mounted gantry (rmg) container yard operating cranes. it develops a generic cost based model for a pair-wise comparison, analysis and evaluation of economic efficiency and effectiveness of container yard equipment to be used for decision-making by terminal pla...

Journal: :British medical journal 1972
J C Horrocks A P McCann J R Staniland D J Leaper F T De Dombal

This paper describes a system of computer-aided diagnosis using an English Electric KDF9 computer linked to a terminal in a busy clinical department. Data from a series of patients were recorded, coded, and entered into the computer, which then performed a Bayesian analysis and displayed diagnostic probabilities in an adaptable format. Experience in this setting suggests that computer diagnosis...

Journal: :Symmetry 2023

The optimal control theory in mathematics aims to study the finding of for a dynamic system over time, where an objective function is optimized. It has broad range applications engineering, operations research, and science. main purpose this provide numerical algorithms two cases problems fractional order that involve derivatives with free non-free terminal time. In addition comparing results t...

Mehri Habibi, Mohammad Reza Asadi Karam, Saeid Bouzari,

  Introduction : The innate immune system as the first line of defense against the pathogens recognizes pathogen-associated molecular patterns (PAMPs) by Toll-Like Receptors (TLRs). Interaction of bacterial PAMPs by TLRs results in activation of innate and acquired immunity. FimH adhesin, a minor component of type 1 fimbriae encoded by Uropathogenic Escherichia coli (UPEC) is a PAMP of TLR4 tha...

Journal: :Networks 1986
Timothy B. Brecht Charles J. Colbourn

The probability that a computer network is operational in an environment of statistically independent link failures has been widely studied. Three natural problems arise, when all nodes are to be connected (all-terminal reliability), when two nodes are to communicate (2-terminal reliability), and when k specified nodes are to communicate (k-terminal reliability); the latter case includes the fi...

1980
Ian H. Witten

A scheme is described which enables users to interact with a timesharing computer in an ideographic language such as Chinese. The host computer runs a completely unmodified Englishbased operating system° the necessary translation being performed by a preprocessing microcomputer which constitutes the ideographic terminal. The two systems communicate through a serial line, and the host sees the p...

Journal: : 2022

A multimodal approach to prevent the cognitive impairment in patients with cardiovascular diseases combines control of major risk factors, recovery, and physical training. Here we discuss current advances computer-aided (also called computer-assisted) recovery diseases, as this has a number advantages comparison conventional tools. We describe training software stimulate perception, attention, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید