نتایج جستجو برای: hoc tests

تعداد نتایج: 383823  

2005
Saad Biaz Chris Walstad Christopher W. Miller Russell Pierce

Testing and evaluation of mobile ad hoc network routing protocols is typically performed by simulation or in very small scale tests on real devices. Indeed, it is difficult to perform repeatable large scale tests with physically moving nodes according to a predetermined movement scenario. However, it is critical to test these protocols on real devices and networks because simulations inevitably...

2012
Anna Thanopoulou Paulo Carreira Helena Galhardas

Most medium-sized enterprises run their databases on inexpensive off-the-shelf hardware; still, answers to quite complex queries, like ad-hoc Decision Support System (DSS) ones, are required within a reasonable time window. Therefore, it becomes increasingly important that the chosen database system and its tuning be optimal for the specific database size and design. Such optimization could occ...

2006
Arthur W. Mahoney Daniel W. Watson

This paper introduces a variant of the Rapidlyexploring Random Leafy Tree, called the Near-sighted Tarzan Algorithm, that performs path planning (for message routing) in a discrete graph simulating the communication network of an Altruistically Negotiating System. The Near-sighted Tarzan Algorithm is designed to operate in environments with similar characterstics as an ad hoc network. These cha...

Journal: :Electronics 2021

Mobile ad-hoc networks (MANETs) have a decentralized nature that makes them suitable for variety of applications [...]

Journal: :Progress in Nuclear Energy 2021

The digitalization of nuclear power plants, with the rapid growth information technology, opens door to development new methods condition-based maintenance. In this work, a semi-supervised method for characterizing level degradation plant components using measurements collected during operational transients is proposed. It based on fusion selected features extracted from monitored signals. Feat...

Journal: :Future Internet 2023

Cyber sextortion attacks are security and privacy threats delivered to victims online, distribute sexual material in order force the victim act against their will. This continues be an under-addressed concern society. study investigated social engineering phishing email design influence techniques susceptibility cyber attacks. Using a quantitative methodology, survey measured with focus on four...

Journal: :Scandinavian Journal of Statistics 2022

Simultaneous inference allows for the exploration of data while deciding on criteria proclaiming discoveries. It was recently proved that all admissible post hoc methods true discoveries must employ closed testing. In this paper, we investigate efficient testing with local tests a special form: thresholding function sums test scores individual hypotheses. Under design, propose new statistic qua...

Journal: :Nuances: estudos sobre Educação 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید