Repository logo
  • Log In
  • ...
  • Log In
  • ...
Repository logo
LIBRARY CENTER DIGITAL LIBRARY
  • Communities & Collections
  • Browse
    • By Issue Date
    • By Author
    • By Title
    • By Subject
    • By Type
    • By Topic
  • Entities
  • Help
  • Contact
  1. Home
  2. Browse by Topic

Browse

  • Communities & Collections
  • Issue Date
  • Author
  • Title
  • Subject
  • Type
  • Topic

Author profile

  • Đặng, Hương Giang (13)
  • Trần, Thị Hoàng Yến (6)
  • Đinh, Thị Kim Xuyến (5)
  • Hoàng, Thu Hiền (5)
  • Nguyễn, Văn Mùi (4)
  • Nguyễn, Thành Huân (4)
  • Vũ, Thị Thục Oanh (3)
  • Nguyễn, Thị Thu Hằng (3)
  • Phạm, Thị Thùy Vân (2)
  • Đặng, Thị Tuyết Minh (2)
  • Vũ, Thị Anh (2)
  • Trần, Hoàng Long (2)
  • Ngô, Thế Chi (2)
  • Ngô, Thị Trà (1)
  • Đặng, Thu Trang (1)
  • Vũ, Thành Long (1)
  • Vũ, Mỹ Hạnh (1)
  • Phan, Thị Thanh Hương (1)
  • Nguyễn, Trường Giang (1)
  • Nguyễn, Thị Tình (1)
  • Đặng, Văn Hòa (1)
  • Trần, Thanh Đại (1)
  • Mai, Thị Vân Anh (1)
  • Nguyễn, Thị Thanh Hoa (1)
  • Nguyễn, Hồng Yến (1)
  • Phạm, Thị Thu (1)
  • Đỗ, Thị Kim Loan (1)
  • Đặng, Thị Hương Giang (1)
  • Nguyễn, Thị Chà (1)
  • Nguyễn, Ngọc Khương (0)

Load More

TRAINING MAJORS

  • Khoa Điện - Tự động hóa (791)
  • Khoa Công nghệ thông tin (477)
  • Khoa Cơ khí (364)
  • Khoa Dệt may và Thời Trang (157)
  • Khoa Công nghệ thực phẩm (104)

Load More

  1. Home
  2. Browse by Topic

Browsing by Topic "Khoa Công nghệ thông tin"

Jump to
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Enter the first letter
Now showing 1 - 24 of 477
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Publication
    AI and Blockchain Technology in 6G Wireless Network
    (Springer, 2022) Borah, Malaya Dutta; Singh, Pushpa; Deka, Ganesh Chandra
    This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
  • Loading...
    Thumbnail Image
    Publication
    Algorithms For Big Data
    (World Scientific, 2020) Feldman, Moran
    This unique volume is an introduction for computer scientists, including a formal study of theoretical algorithms for Big Data applications, which allows them to work on such algorithms in the future. It also serves as a useful reference guide for the general computer science population, providing a comprehensive overview of the fascinating world of such algorithms.To achieve these goals, the algorithmic results presented have been carefully chosen so that they demonstrate the important techniques and tools used in Big Data algorithms, and yet do not require tedious calculations or a very deep mathematical background.
  • Loading...
    Thumbnail Image
    Publication
    Áp dụng mạng tích chập (CNN) và Densenet201 vào xây dựng mô hình bán trái cây tự động dựa trên thị giác máy tính
    (Trường Đại học Kinh tế - Kỹ thuật Công nghiệp, 2025) Giang, Quốc Hào; Nguyễn, Vũ Hiệp; Vũ, Văn Đốc
    Tổng quan. Cơ sở lý thuyết. Phương pháp nghiên cứu. Kết luận và đề nghị
  • Loading...
    Thumbnail Image
    Publication
    Bài giảng phân tích thiết kế hệ thống hướng đối tượng
    Lê, Thị Kiều Oanh
    Tổng quan về phân tích thiết kế hệ thống hướng đối tượng
  • Loading...
    Thumbnail Image
    Publication
    Bảo mật dữ liệu bằng nhúng tin trong ảnh số
    (Trường Đại học Kinh tế - Kỹ thuật Công nghiệp, 2024) Nguyễn, Trọng Hiệp; Phạm, Văn Ất; Nguyễn, Xuân Trực
    Tìm hiểu một số kỹ thuật giấu tin trong ảnh. Một số phương pháp nhúng tin trong ảnh nhị phân và ảnh mầu. Bảo mật dữ liệu trên mạng bằng phương pháp nhúng tin trong ảnh.
  • Loading...
    Thumbnail Image
    Publication
    Big Data : Principles and Best Practices of Scalable Realtime Data Systems
    (Manning, 2015) Warren, James; Marz, Nathan
    SummaryBig Data teaches you to build big data systems using an architecture that takes advantage of clustered hardware along with new tools designed specifically to capture and analyze web-scale data. It describes a scalable, easy-to-understand approach to big data systems that can be built and run by a small team. Following a realistic example, this book guides readers through the theory of big data systems, how to implement them in practice, and how to deploy and operate them once they're built.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the BookWeb-scale applications like social networks, real-time analytics, or e-commerce sites deal with a lot of data, whose volume and velocity exceed the limits of traditional database systems. These applications require architectures built around clusters of machines to store and process data of any size, or speed.
  • Loading...
    Thumbnail Image
    Publication
    Big Data For Dummies
    (For Dummies, 2013) Hurwitz, Judith S.; Nugent, Alan; Halper, Fern; Kaufman, Marcia
    Find the right big data solution for your business or organization Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work. Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more
  • Loading...
    Thumbnail Image
    Publication
    Blockchain and the Commons
    (Routledge, 2023) Papadimitropoulos, Vangelis
    Recent years have seen a surge of interest in ‘the commons'based on a simple yet radical idea: great improvements in production and management could be achieved by reducing barriers to knowledge exchange and power-sharing. Ranging from meadows, forests and parks to language, open-source software (FLOSS and Blockchain) and 3D printers, the commons are distributed or common property resources/infrastructures that are self-managed by their user communities. While acknowledging the significant contributions that can be made through commons-based peer production, this book provides a critical examination of the commons with the aim of contributing to their long-term sustainability. In particular, the book examines the relation of Blockchain to the commons by illustrating the case study of the Commons Stack.Drawing on a range of interdisciplinary ideas and methodologies, the book argues that there are a number of economic and social barriers that are obstructing the wider reproduction of the commons.
  • Loading...
    Thumbnail Image
    Publication
    Blockchain Basics : A Non-Technical Introduction in 25 Steps
    (Apress, 2017) Drescher, Daniel
    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solves
  • Loading...
    Thumbnail Image
    Publication
    Blockchain Security From the Bottom Up : Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
    (Wiley, 2022) Poston III, Howard E.
    The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
  • Loading...
    Thumbnail Image
    Publication
    Các cấu trúc kết nối trong máy tính hiện đại = Interconnection structuers in advance computer
    (2023) Nguyễn, Xuân Quân; Hoàng, Đắc Thắng; Phạm, Thị Huệ
    Giới thiệu về kết nối bus gồm bus hệ thống, bus song song và bus nối tiếp. Trình bày về kiến trúc Quickpath Interconnection, PCI Express; nêu ra ứng dụng, những thách thức và cơ hội trong việc sử dụng QPI, PCI. So sánh QPI và PCI Express.
  • Loading...
    Thumbnail Image
    Publication
    Các thuật toán học máy trong khai thác dữ liệu lớn và ứng dụng phân đoạn khách hàng
    (Trường Đại học Kinh tế - Kỹ thuật Công nghiệp, 2024) Vũ, Tiến Đạt; Lê, Thị Kiều Oanh ; Nguyễn, Vũ An
    Tổng quan về dữ liệu lớn, một số thuật toán học máy trong khái thác dữ liệu lớn. Ứng dụng thuật toán phân cụm vào phân đoạn khách hàng
  • Loading...
    Thumbnail Image
    Publication
    Cài đặt thuật toán K - Means cho chức năng gợi ý sản phẩm của website bán sách
    (2023) Nguyễn, Thị Thu Hiền; Vũ, Anh Tuấn; Lê, Văn Trường
    Nêu ra khảo sát hiện trạng, cơ sở lý thuyết: hệ gợi ý, thuật toán phân cụm K-Means, các công cụ nền tảng sử dụng trong luận văn. Phân tích thiết kế hệ thống. Đưa ra gợi ý sản phẩm bằng thuật toán K-Means. Trình bày kết quả cài đặt và xây dựng.
  • Loading...
    Thumbnail Image
    Publication
    CCFP Certified Cyber Forensics Professional All-in-One Exam Guide
    (McGraw Hill, 2015) Easttom, Chuck
    Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guide fully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL SIX EXAM DOMAINS: Legal and ethical principles Investigations Forensic science Digital forensics Application forensics Hybrid and emerging technologies ELECTRONIC CONTENT INCLUDES: 250 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain
  • Loading...
    Thumbnail Image
    Publication
    CEH V11 : Certified Ethical Hacker Version 11 Practice Tests
    (Sybex, 2022) Messier, Ric
    Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics.
  • Loading...
    Thumbnail Image
    Publication
    CEH V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
    (Sybex, 2023) Messier, Ric
    The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements.
  • Loading...
    Thumbnail Image
    Publication
    CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide
    (McGraw Hill, 2015) Brooks, Charles L.
    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference. CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics.
  • Loading...
    Thumbnail Image
    Publication
    Circuits, Packets, and Protocols : Entrepreneurs and Computer Communications, 1968-1988
    (ACM Books, 2022) Pelkey, James L.; Russell, Andrew L.; Robbins, Loring G.
    As recently as 1968, computer scientists were uncertain how best to interconnect even two computers. The notion that within a few decades the challenge would be how to interconnect millions of computers around the globe was too far-fetched to contemplate. Yet, by 1988, that is precisely what was happening. The products and devices developed in the intervening years—such as modems, multiplexers, local area networks, and routers—became the linchpins of the global digital society. How did such revolutionary innovation occur? This book tells the story of the entrepreneurs who were able to harness and join two factors: the energy of computer science researchers supported by governments and universities, and the tremendous commercial demand for Internetworking computers.
  • Loading...
    Thumbnail Image
    Publication
    Cloud Computing Basics : A Non-Technical Introduction
    (Apress, 2021) Lisdorf, Anders
    Regardless of where your organization is in your cloud journey, moving to the cloud is an inevitability in the coming years. The cloud is here to stay, and now is the best time to identify optimal strategies to harness the benefits and mitigate the risks. Cloud Computing Basics is the practical, accessible entry point you have been seeking.Get an introduction to the basics of cloud computing and all five major cloud platforms. Author Anders Lisdorf ensures that you gain a fundamental cloud vocabulary and learn how to translate industry terms used by different vendors. Leveraging the economic and security benefits that the cloud provides can look very different for each organization, and Lisdorf uses his expertise to help you adapt your strategy accordingly.
  • Loading...
    Thumbnail Image
    Publication
    Computer Security and Encryption : An Introduction
    (Mercury Learning & Information, 2020) Chauhan, S. R.; Jangra, S.
    Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based.
  • Loading...
    Thumbnail Image
    Publication
    Đánh giá chất lượng trải nghiệm người dùng trên truyền tải đa luồng
    (2019) Hoàng, Quang Thịnh; Cao, Diệp Thắng
  • Loading...
    Thumbnail Image
    Publication
    Đánh giá độ nhất quán của dữ liệu trong bảng quyết định đầy đủ giá trị phân loại
    (2021) Hoàng, Thanh Huyền; Trần, Thanh Đại
    Đề tài đã bước đầu tìm hiểu cơ sở lý thuyết về tập thô, trong đó các khái niệm cơ bản về hệ thông tin, bảng quyết định, quan hệ tương đương, ma trận quan hệ, độ đo theo tiếp cận miền dương đã được tìm hiểu kĩ lưỡng trước khi áp dụng vào bài toán cụ thể. Á
  • Loading...
    Thumbnail Image
    Publication
    Đánh giá độ nhất quán của dữ liệu trong bảng quyết định không đầy đủ giá trị phân loại
    (2021) Lưu, Đình Đức; Trần, Thanh Đại
    Trình bày tổng quan về khai phá dữ liệu, Khai phá dữ liệu theo tiếp cận tập thô, chương trình thực nghiệm.
  • Loading...
    Thumbnail Image
    Publication
    Đánh giá hiệu năng của giao thức định tuyến chủ động DSDV trong mô hình bản đồ thực tế với chuẩn 802.11A và 802.11 P
    (2019) Trần, Minh Hải; Nguyễn, Hoàng Chiến
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 20
LIBRARY CENTER DIGITAL LIBRARY
Download App
android download appios download app

Contact info

Ha Noi Campus:
  • 1st Floor - HA5 - 454 Minh Khai, Vinh Tuy Ward, Hanoi City
  • 2nd Floor - HA10 - 218 Linh Nam, Hoang Mai Ward, Hanoi City
Ninh Binh Campus:
  • Library Building - 353 Tran Hung Dao, Nam Dinh Ward, Ninh Binh Province
Email: thuvien@uneti.edu.vn

Connect with us

Related websites
Copyright © 2024 UNETI University. All Rights Reserved