نتایج جستجو برای: arp plus noise process
تعداد نتایج: 1584340 فیلتر نتایج به سال:
Tra c using the Fractal-Shot-Noise-Driven Poisson Process Bong K. Ryu and Steven B. Lowen Department of Electrical Engineering and Center for Telecommunications Research Columbia University, New York, NY 10027, U.S.A. fryu, [email protected] Abstract Presented in this paper is the fractal-shot-noisedriven Poisson process (FSNDP), a self-similar process which permits parsimonious modeling...
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...
We present redshift measurements of four faint galaxies around the archetypal ultraluminous infrared galaxy Arp 220. These galaxies have significantly higher redshifts (z ∼ 0.036 – 0.091) than that of Arp 220 (z ≃ 0.018). Therefore, we conclude that they are background objects not physically related to Arp 220. Three of these faint galaxies located to the south of Arp 220 are a group of galaxie...
Today, link-state routing protocols that compute multiple shortest paths predominate in data center and campus networks, where routing is performed either in layer three or in layer two using link-state routing protocols. But current proposals based on link-state routing do not adapt well to real time tra c variations and become very complex when attempting to balance the tra c load. We propose...
The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-middle attack (MiM)] and gain access to sensitive information, or perform denial of service attack (DoS) on target hosts. Several security solutions, s...
This research was conducted at Food Micro, Small and Medium Enterprises (MSMEs) in Medan City. In this study, observations were made on all activities, so that the process stages risks affect halal each stage of are known. Furthermore, risk factors identified, House Risk (HOR) method is used to find dominant cause through calculation Aggregate Potential (ARP). The results showed there 9 process...
If you want to cite this report, please use the following reference instead: T.J.J. van den Boom and B. De Schutter, " Model predictive control for perturbed max-plus-linear systems, " Abstract Model predictive control (MPC) is a popular controller design technique in the process industry. Conventional MPC uses linear or nonlinear discrete-time models. Recently, we have extended MPC to a class ...
In this paper I propose an alternative factor model whose common factor follows a mean-plus-noise process. While the existing methods for factor models should be valid for this model, their performance may be misleading in small samples. Because the likelihood function of this model is not tractable, I estimate this model by Bayesian methods. When applied to U.S. macroeconomic time series, we f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید