Search results
From OnnoCenterWiki
Jump to navigationJump to search
- Section I - Theory, Usage, and Utilities Traditional IPv4 routing Theory ...6 KB (902 words) - 07:57, 12 November 2014
- ...John Harper's excellent website about thermionic emission and vacuum tube theory--much mathematical detail, at college level. * http://www.svetlana.com/docs/tubeworks.html - Plenty of interesting information about vacuum tubes ...3 KB (400 words) - 01:14, 29 July 2012
- ...sh size (how many attributes will be on the output, corresponds to bits of information) and shingle length (how many tokens are used in a shingle). ...orithms. STOC ‘02 Proceedings of the thirty-fourth annual ACM symposium on Theory of computing, p. 380-388. ...1 KB (194 words) - 02:54, 12 April 2020
- ...out requiring [[channel state information]] at the transmitter, while such information is essential to handle the co-user interference in multi-user systems. ...he throughput, called [[channel capacity]], depends on the [[channel state information]] available in the system. ...9 KB (1,258 words) - 12:25, 28 December 2010
- ...:''' Understanding basic concepts such as networks, operating systems, and information security. * '''Learning theory:''' Listening to lectures about security concepts. ...2 KB (288 words) - 01:26, 19 October 2024
- * Information on the input random forest model. ...oceedings of the 5th International Conference on Information Visualization Theory and Applications, 17-28. ...3 KB (398 words) - 02:14, 9 April 2020
- * Information on the input tree model. ** Enable tooltips: display node information upon hovering. ...4 KB (496 words) - 04:24, 8 April 2020
- * [[Competitive]]: [[Game theory]], autonomous packets, implicit MAC fairness, etc. ...aditional mobile [[cellular network]] systems, the [[base station]] has no information on the position of the mobile units within the cell and radiates the signal ...18 KB (2,588 words) - 06:29, 7 January 2011
- Theory of the WSPR Protocol ...ke a WSPR transmitter. I worked through it because I was interested in the theory and maths. But I guess most people are not! :) ...9 KB (1,476 words) - 10:33, 13 November 2016
- ==Theory== A little theory first. WEP is a really crappy and old encryption techinque to secure a wire ...14 KB (2,493 words) - 01:23, 12 December 2015
- ...sion of an [[IMSI]] number, which is stored on a [[SIM card]] that can (in theory) be transferred to any handset. However, many network and security features ...IMEI (14 decimal digits plus a check digit) or IMEISV (16 digits) includes information on the origin, model, and serial number of the device. The structure of the ...12 KB (1,783 words) - 03:43, 14 March 2012
- ...methods|decoding]] a [[digital]] [[data]] stream or [[signal (information theory)|signal]]. The word ''codec'' is a [[portmanteau]] (a blending of two or mo ...ly used for archiving data in a compressed form while retaining all of the information present in the original stream. If preserving the original quality of the s ...7 KB (1,003 words) - 02:45, 12 August 2012
- ...streams is used. Note that precoding requires knowledge of [[channel state information]] (CSI) at the transmitter. ...Diversity Coding]]''' techniques are used when there is no [[channel state information|channel knowledge]] at the transmitter. In diversity methods, a single stre ...17 KB (2,318 words) - 12:08, 28 December 2010
- * '''Hands-on practice:''' CTF provides direct experience in applying the theory learned in class. ...ere participants are tasked with solving a series of challenges related to information security. These challenges can involve exploitation, programming, forensic ...7 KB (1,012 words) - 11:41, 27 October 2024
- ...heories from multiple fields, including [[mathematics]], [[statistics]], [[information science]], and [[computer science]]. ...anging due to the impact of information technology" and the emergence of [[information explosion|big data]]. ...8 KB (1,099 words) - 08:05, 11 February 2025
- ...ipt kiddies who hack any old site. The main step here is gathering as much information about a site as possible. Find out what OS they run at netcraft or by using ...was it? It may take awhile, but go through the site slowly and get all the information you can. ...16 KB (3,070 words) - 13:32, 7 April 2015
- ...onstructive and destructive interference in the wavefront. When receiving, information from different sensors is combined in such a way that the expected pattern ...erest. In contrast, adaptive beamforming techniques generally combine this information with properties of the signals actually received by the array, typically to ...12 KB (1,745 words) - 12:14, 28 December 2010
- ...is changing because of the impact of information technology" dan adanya [[information explosion|data deluge]]. * theory. ...18 KB (2,317 words) - 07:25, 11 February 2025
- ...ver changing it. The ultimate objective is that every router has identical information about the network, and each router will independently calculate its own bes ...stributed database protocols, are built around a well-known algorithm from theory, E. W. Dijkstra's shortest path algorithm. Examples of link state routing p ...32 KB (5,434 words) - 09:16, 22 March 2019
- ...fferent types of research turns out to be an idea that makes more sense in theory than it does in practice. The reason behind your using of triangulation was to gather different information; and not to find the similarities!! between Qant. and Qual. ...8 KB (1,199 words) - 12:14, 22 August 2019