
- Subject:
- Computer Science
- Material Type:
- Activity/Lab
- Provider:
- Prince Sattam Bin Abdulaziz University
- Author:
- Prince Sattam Bin Abdulaziz University
- Date created
- 9-جمادي الآخرة-1440
Plagiarism and how to avoid it
Binary to Decimal
شرح طريقه أستخدام برنامج xclass
شرح طريقه أستخدام برنامج xclass
What the server does| part 1 and part 2 The first part ...
What the server does| part 1 and part 2
The first part is the status line
The second part of the response is header information| ended by a blank line
In wireless sensor networks (WSNs)| prototyping systems facilitate the realization of real ...
In wireless sensor networks (WSNs)| prototyping systems facilitate
the realization of real node deployment| enabling to test new algorithms| protocols|
and networking solutions. This paper investigates the 3D indoor redeployment
problem in WSNs by finding the positions where nodes should be added in
order to improve an initial deployment while optimizing different objectives. For
this purpose| an approach based on a recent evolutionary optimization algorithm
(NSGA-III) is used. The latter algorithm is hybridized with a strategy of incorporating
of the user preferences (PI-EMO-VF). The major contributions of this
work are as follows: testing the NSGA-III efficiency in the case of real world
problems| comparing it with another recent many-objective algorithm (MOEA/
DD)| and incorporating the concept of preferences of users into NSGA-III. The
real experiments performed on our testbeds indicate that the results given by the
proposed algorithm are better than those given by other recent optimization algorithms
such as MOEA/DD.
شرح طريقه أستخدام برنامج xclass
شرح طريقه أستخدام برنامج xclass
شرح طريقه أستخدام برنامج xclass
شرح طريقه أستخدام برنامج xclass
شرح طريقه أستخدام برنامج xclass
E-mail system is one of the most ubiquitous Internet-based applications today. It ...
E-mail system is one of the most ubiquitous Internet-based applications today. It enables users
to send and receive E-mail messages among each other within and from outside of the local area
network. E-mail system is used every day in almost all organizations as a communication tool between
managers| employees| customers| and partners for better information flow and conduct business which
requires communication with people outside the organization| or from different geographical
locations. The E-mail system offers a fast| reliable and easy solution for such communication. SMTP
(Simple Mail Transfer Protocol) is a transportation protocol used to transfer E-mail messages over the
Internet. All E-mail servers use the SMTP to send E-mails from one E-mail server to another. SMTP
is also used to send E-mail messages from E-mail clients to E-mail servers. In this paper| the SMTP
E-mail system protocol will be briefly explained. New Active monitoring algorithm architecture is
also proposed to improve the current E-mail system protocol functions and detect the SMTP protocol
failure during the process of sending E-mail messages
Every secure system has the possibility to fail. Therefore| extra effort should ...
Every secure system has the possibility to fail. Therefore| extra effort should be taken to protect these systems. Intrusion Detection Systems (IDSs) had been proposed with the aim of providing extra protection to security systems. These systems trigger thousands of alerts per day| which prompt security analysts to verify each alert for relevance and severity based on an aggregation criterion. Several aggregation methods have been proposed to collect these alerts. This paper presents our threshold aggregation system (TAS). Results shows that TAS aggregates IDS alerts accurately based on user demands and threshold value.
In this learning object we explained The AIRLINE relational database schema
void await() Put the thread on wait set for this condition. void ...
void await()
Put the thread on wait set for this condition.
void signalAll()
Unblock all threads in the wait set for this condition.
void signal()
Unblock one random thread from the wait set for this condition
ARE COMPUTER HACKER BREAK-INS ETHICAL?
This learning object focusses on the commissioning of ARPANET in 1966 by ...
This learning object focusses on the commissioning of ARPANET in 1966 by Advanced Research Project Agency (ARPA) to conduct research on networking.
Using A* Search
This subject is made about Abstract Factory Design Pattern and public class ...
This subject is made about Abstract Factory Design Pattern and public class Green implements Color and Consequences
You can access Open Educational Resources without logging in.
Only users from SHMS member institutions can register/login. Click here to know more about member benefits.