نتایج جستجو برای: hoc tests
تعداد نتایج: 383823 فیلتر نتایج به سال:
Testing and evaluation of mobile ad hoc network routing protocols is typically performed by simulation or in very small scale tests on real devices. Indeed, it is difficult to perform repeatable large scale tests with physically moving nodes according to a predetermined movement scenario. However, it is critical to test these protocols on real devices and networks because simulations inevitably...
Most medium-sized enterprises run their databases on inexpensive off-the-shelf hardware; still, answers to quite complex queries, like ad-hoc Decision Support System (DSS) ones, are required within a reasonable time window. Therefore, it becomes increasingly important that the chosen database system and its tuning be optimal for the specific database size and design. Such optimization could occ...
This paper introduces a variant of the Rapidlyexploring Random Leafy Tree, called the Near-sighted Tarzan Algorithm, that performs path planning (for message routing) in a discrete graph simulating the communication network of an Altruistically Negotiating System. The Near-sighted Tarzan Algorithm is designed to operate in environments with similar characterstics as an ad hoc network. These cha...
Mobile ad-hoc networks (MANETs) have a decentralized nature that makes them suitable for variety of applications [...]
The digitalization of nuclear power plants, with the rapid growth information technology, opens door to development new methods condition-based maintenance. In this work, a semi-supervised method for characterizing level degradation plant components using measurements collected during operational transients is proposed. It based on fusion selected features extracted from monitored signals. Feat...
Cyber sextortion attacks are security and privacy threats delivered to victims online, distribute sexual material in order force the victim act against their will. This continues be an under-addressed concern society. study investigated social engineering phishing email design influence techniques susceptibility cyber attacks. Using a quantitative methodology, survey measured with focus on four...
Simultaneous inference allows for the exploration of data while deciding on criteria proclaiming discoveries. It was recently proved that all admissible post hoc methods true discoveries must employ closed testing. In this paper, we investigate efficient testing with local tests a special form: thresholding function sums test scores individual hypotheses. Under design, propose new statistic qua...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید