Academic literature on the topic 'WebPosition analyzer (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WebPosition analyzer (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WebPosition analyzer (Computer file)"

1

Narwal, Priti, Deepak Kumar, and Shailendra N. Singh. "A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud." Journal of Cases on Information Technology 21, no. 4 (2019): 14–26. http://dx.doi.org/10.4018/jcit.2019100102.

Full text
Abstract:
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of t
APA, Harvard, Vancouver, ISO, and other styles
2

Katyayan, Pragya, and Nisheeth Joshi. "Development of Automatic Rule-based Semantic Tagger and Karaka Analyzer for Hindi." ACM Transactions on Asian and Low-Resource Language Information Processing 21, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3479155.

Full text
Abstract:
Hindi is the third most-spoken language in the world (615 million speakers) and has the fourth highest native speakers (341 million). It is an inflectionally rich and relatively free word-order language with an immense vocabulary set. Despite being such a celebrated language across the globe, very few Natural Language Processing (NLP) applications and tools have been developed to support it computationally. Moreover, most of the existing ones are not efficient enough due to the lack of semantic information (or contextual knowledge). Hindi grammar is based on Paninian grammar and derives most o
APA, Harvard, Vancouver, ISO, and other styles
3

Jawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance
APA, Harvard, Vancouver, ISO, and other styles
4

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used
APA, Harvard, Vancouver, ISO, and other styles
5

Ramos, Rogelio, Roumen Zlatev, Benjamin Valdez, Margarita Stoytcheva, Mónica Carrillo, and Juan-Francisco García. "LabVIEW 2010 Computer Vision Platform Based Virtual Instrument and Its Application for Pitting Corrosion Study." Journal of Analytical Methods in Chemistry 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/193230.

Full text
Abstract:
A virtual instrumentation (VI) system called VI localized corrosion image analyzer (LCIA) based on LabVIEW 2010 was developed allowing rapid automatic and subjective error-free determination of the pits number on large sized corroded specimens. The VI LCIA controls synchronously the digital microscope image taking and its analysis, finally resulting in a map file containing the coordinates of the detected probable pits containing zones on the investigated specimen. The pits area, traverse length, and density are also determined by the VI using binary large objects (blobs) analysis. The resulti
APA, Harvard, Vancouver, ISO, and other styles
6

Astsatryan, Hrachya, Arthur Lalayan, Aram Kocharyan, and Daniel Hagimont. "Performance-efficient Recommendation and Prediction Service for Big Data frameworks focusing on Data Compression and In-memory Data Storage Indicators." Scalable Computing: Practice and Experience 22, no. 4 (2021): 401–12. http://dx.doi.org/10.12694/scpe.v22i4.1945.

Full text
Abstract:
The MapReduce framework manages Big Data sets by splitting the large datasets into a set of distributed blocks and processes them in parallel. Data compression and in-memory file systems are widely used methods in Big Data processing to reduce resource-intensive I/O operations and improve I/O rate correspondingly. The article presents a performance-efficient modular and configurable decision-making robust service relying on data compression and in-memory data storage indicators. The service consists of Recommendation and Prediction modules, predicts the execution time of a given job based on m
APA, Harvard, Vancouver, ISO, and other styles
7

Smiliotopoulos, Christos, Konstantia Barmpatsalou , and Georgios Kambourakis. "Revisiting the Detection of Lateral Movement through Sysmon." Applied Sciences 12, no. 15 (2022): 7746. http://dx.doi.org/10.3390/app12157746.

Full text
Abstract:
This work attempts to answer in a clear way the following key questions regarding the optimal initialization of the Sysmon tool for the identification of Lateral Movement in the MS Windows ecosystem. First, from an expert’s standpoint and with reference to the relevant literature, what are the criteria for determining the possibly optimal initialization features of the Sysmon event monitoring tool, which are also applicable as custom rules within the config.xml configuration file? Second, based on the identified features, how can a functional configuration file, able to identify as many LM var
APA, Harvard, Vancouver, ISO, and other styles
8

Gyimesi, Péter. "Automatic Calculation of Process Metrics and their Bug Prediction Capabilities." Acta Cybernetica 23, no. 2 (2017): 537–59. http://dx.doi.org/10.14232/actacyb.23.2.2017.7.

Full text
Abstract:
Identifying fault-prone code parts is useful for the developers to help reduce the time required for locating bugs. It is usually done by characterizing the already known bugs with certain kinds of metrics and building a predictive model from the data. For the characterization of bugs, software product and process metrics are the most popular ones. The calculation of product metrics is supported by many free and commercial software products. However, tools that are capable of computing process metrics are quite rare. In this study, we present a method of computing software process metrics in a
APA, Harvard, Vancouver, ISO, and other styles
9

Chukwuchekwa, Nkwachukwu, Enwume Joshua U, Longinus S. Ezema, and Cosmas K Agubor. "Investigation of Radio Frequency Licensed Spectrum Utilization in Nigeria: A Study of Rumuokwuta, Port Harcourt, Nigeria." International Journal of Wireless & Mobile Networks 13, no. 05 (2021): 31–41. http://dx.doi.org/10.5121/ijwmn.2021.13503.

Full text
Abstract:
This study was carried out to investigate the spectrum utilization of the licensed Radio Frequency (RF) spectrum in Rumuokwuta, Port Harcourt. An outdoor measurement of spectrum occupancy was carried out in a high-rise building situated at Rumuokwuta urban area in Port Harcourt, Nigeria using RF explorer spectrum analyzer and a personal computer laptop system. Spectrum activities in the band of 240-960 MHz were monitored for 24 hours. The frequency band was subdivided into 24 sub bands each with a span size of 30 MHz. Scanning of bands was made efficient using a python script that scans a rang
APA, Harvard, Vancouver, ISO, and other styles
10

AR, Dinesh, and Dr Pradeep Udupa. "Foreseeing Outbreak Investigation by Means of Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1130–35. http://dx.doi.org/10.22214/ijraset.2023.50250.

Full text
Abstract:
Abstract: The deliberate breach of a security strategy is what intrusion exposure is. In order to look for any malicious actions or extortions, invasion discovery systems monitornetwork traffic passing across numerous types of computer systems and deliver warnings when it perceives any hazards. Systems for identifying extortions should be able to recognize every injurious software and occurrence in the linkage. All forms of occurrences,comprising intrusion, file less malware, botnets, and malware, are changing the threat environment. In order to identify harmful events by investigating the pro
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "WebPosition analyzer (Computer file)"

1

Konia, Brad S. Search engine optimization with WebPosition Gold 2. Wordware Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sours, Richard E. Exploring calculus with Analyzer. Addison-Wesley Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yerushalmy, Michal. Visualizing algebra: Algebra problems and projects for The function analyzer. Sunburst Communications, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Konia, Brad S. Search Engine Optimization with WebPosition Gold. Wordware Publishing, Inc., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Essick, John. The Python-Based Laboratory. Oxford University PressOxford, 2024. https://doi.org/10.1093/9780191998478.001.0001.

Full text
Abstract:
Abstract The Python-Based Laboratory: A Hands-On Guide for Scientists and Engineers provides a learn-by-doing approach to acquiring the Python programming skills needed to implement computer-controlled experimental work. The Python-Based Laboratory leads its readers to mastery of the popular, open-source Python computer language in its role as a powerful laboratory tool by carrying out interesting and relevant projects that explore the acquisition, production, analysis, and presentation of digitized waveforms. Readers, who are assumed to have no prior computer programming or Python background,
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WebPosition analyzer (Computer file)"

1

Qasim Arafat, Zaid. "Investigating User Privacy and Security on Telegram Messenger: A Wireshark Analysis." In 5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24). Cihan University-Erbil, 2024. http://dx.doi.org/10.24086/cocos2024/paper.1158.

Full text
Abstract:
The aim of this study is to scrutinize the safety and confidentiality strategies implemented by Telegram Messenger with the assistance of Wireshark, an extensively used network protocol analyzer. Our scrutiny will be centered on diverse dimensions pertaining to user interactions within said platform, such as registration protocols, message exchanges, file conveyance mechanisms, and audio and video calls. The exploration also encompasses a foray into encryption algorithms employed by Telegram while simultaneously weighing out conceivable security risks that might arise from deploying different
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Yirina, and Yu Sun. "An Intelligent and Data-Based Skate Analyzer to Assist in Analyzing Movements of Skate on Ice." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130516.

Full text
Abstract:
Ever since the start of Figure Skating, there has been an emphasis on skating technique, especially in the step sequences of a skater’s choreography [1]. But Figure Skaters often are not able to detect the motion, edge, or placement of their blade on the ice without watching themselves skate. The solution to this problem would be to have a skate analyzer. A skate analyzer would record the movements of a skate on ice and one would be able to playback the recorded data and view their skate motion precisely [2]. Three main components that my project links together are the QTPY-ESP 32 microcontrol
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!