Showing 861 - 880 results of 72,708 for search '"system"', query time: 0.11s Refine Results
  1. 861
  2. 862

    Fault Tolerance Model for Hadoop Distributed System by Soraya Setti Ahmed, Yahya Slimani, Riadh Frefita

    Published 2025-01-01
    Subjects: “…Distributed Systems…”
    Get full text
    Article
  3. 863
  4. 864
  5. 865
  6. 866

    SYSTEM OF PRE-UNIVERSITY TRAINING “SCHOOL – MEPHI” by I. V. ТSVETKOV, D. Y. PRAVNIK

    Published 2017-07-01
    “…The article describes the experience of the National Research Nuclear University “MEPhI” of engineering competences formation in the pre-university training system. The authors show how the research component can enhance physical and mathematical and technological education. …”
    Get full text
    Article
  7. 867
  8. 868
  9. 869
  10. 870

    Coupling and Shielding Properties of the Baffle in ICP System by Jozef Brcka, R. Lee Robison

    Published 2011-01-01
    “…This contribution is dealing with experimental and computational evaluation of the deposition baffle that is transparent to radio frequency (RF) magnetic fields generated by an external antenna in an inductively coupled plasma (ICP) source but opaque to the deposition of the metal onto a dielectric wall in ionized physical vapor deposition (IPVD) system. Various engineering aspects related to the deposition baffle are discussed. …”
    Get full text
    Article
  11. 871
  12. 872
  13. 873

    Who Is Interested in Purchasing Smart Irrigation Systems? by Hayk Khachatryan, Alicia Rihn, Caroline Warwick, Michael Dukes

    Published 2019-09-01
    “… Water scarcity concerns have led to revolutionary new smart technologies for residential landscape irrigation, including evapotranspiration and soil-moisture sensor systems. The adoption of smart irrigation technologies into residential landscapes, however, has been slow. …”
    Get full text
    Article
  14. 874
  15. 875
  16. 876
  17. 877
  18. 878

    Study on user’s identification system in insider threats by PEI Qing-qi1, ZHAO Peng2, ZHANG Hong-bin3, WANG Chao2, YIN Hao1

    Published 2009-01-01
    “…Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the system can determine the identity of the user.As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.…”
    Get full text
    Article
  19. 879

    DEVELOPMENT OF THE LEVEL INDICES SYSTEM OF UNIVERSITY INTERNATIONALIZATION by Artem R. Denisov, Maria M. Stepanova

    Published 2015-11-01
    “…The proposed system of indicators can be used for an estimation of high school development in internationalisation sphere, and under certain correction and improvement for efficiency definition of development of its academic divisions in the given field.…”
    Get full text
    Article
  20. 880

    Method of three-domain integration for IT support system by Yizhi DING, Lei QI, Shaoping LI, Hongwei LV, Yingxia NIU

    Published 2015-12-01
    “…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
    Get full text
    Article