1 - 8 of 8 articles
Abstract Limited resources are a natural feature of most real systems, both artificial and natural ones. This causes the need for effective management of access to existing resources. In this area, queuing systems are of special application. However, they are treated as simple systems for which...
Abstract Steady State Visually Evoked Potentials have been known for several decades and they appear in the primary visual cortex of brain as a result of light stimulation of the sense of sight. In this article a simple method for electroencephalographic data acquisition is presented. The system...
Abstract In order to make the big data mining analysis we meet the limit of computer capacity. We concentrate here on such a situation. We describe the problem, test the key fragment of the algorithm and conclude on the possibilities of similar computations
Abstract Liquid Computing Theory is a proposal of modelling the behaviour of neural microcircuits. It focuses on creating a group of neurons, known as a liquid layer, responsible for preprocessing of the signal that is being analysed. Specific information is achieved by the readout layers, task...
Abstract In this paper the research on a person declaring synesthetic abilities will be presented. According to the current state of knowledge synesthesia activates additional cortical fields in the brain which can be found in the EEG. The research was conducted using an EGI-EEG system...
Abstract The purpose of the study is to analyze the efficiency of communication with the server using the methods of secure remote access, as well as checking and comparing the quality of services provided by the server depending on the method of secure remote connection. The article focuses on...
Abstract The major goal of this article was to evaluate the efficiency of Linux operating system using statistical self-similarity and multifractal analysis. In order to collect the necessary data, the tools available in Linux such as vmstat, top and iostat were used. The measurement data...
Abstract In the article the authors propose a method for load-balancing of network resources for the case which uses a routing protocols. In the first part of the article the authors present currently used algorithms for load balancing and possibilities of their modification. Through the...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.