نتایج جستجو برای: arp plus noise process

تعداد نتایج: 1584340  

1995
Bong K. Ryu Steven B. Lowen

Tra c using the Fractal-Shot-Noise-Driven Poisson Process Bong K. Ryu and Steven B. Lowen Department of Electrical Engineering and Center for Telecommunications Research Columbia University, New York, NY 10027, U.S.A. fryu, [email protected] Abstract Presented in this paper is the fractal-shot-noisedriven Poisson process (FSNDP), a self-similar process which permits parsimonious modeling...

2005
Vivek Ramachandran Sukumar Nandi

The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...

1999
Youichi Ohyama Yoshiaki Taniguchi J. E. Hibbard William D. Vacca

We present redshift measurements of four faint galaxies around the archetypal ultraluminous infrared galaxy Arp 220. These galaxies have significantly higher redshifts (z ∼ 0.036 – 0.091) than that of Arp 220 (z ≃ 0.018). Therefore, we conclude that they are background objects not physically related to Arp 220. Three of these faint galaxies located to the south of Arp 220 are a group of galaxie...

Journal: :Computer Networks 2015
Elisa Rojas Guillermo Ibáñez José Manuel Giménez-Guzmán Juan A. Carral Alberto García-Martínez Isaías Martinez-Yelmo José M. Arco

Today, link-state routing protocols that compute multiple shortest paths predominate in data center and campus networks, where routing is performed either in layer three or in layer two using link-state routing protocols. But current proposals based on link-state routing do not adapt well to real time tra c variations and become very complex when attempting to balance the tra c load. We propose...

Journal: :IJIPT 2010
Zouheir Trabelsi Wassim El-Hajj

The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-middle attack (MiM)] and gain access to sensitive information, or perform denial of service attack (DoS) on target hosts. Several security solutions, s...

Journal: :E3S web of conferences 2021

This research was conducted at Food Micro, Small and Medium Enterprises (MSMEs) in Medan City. In this study, observations were made on all activities, so that the process stages risks affect halal each stage of are known. Furthermore, risk factors identified, House Risk (HOR) method is used to find dominant cause through calculation Aggregate Potential (ARP). The results showed there 9 process...

Journal: :Systems & Control Letters 2002
Ton J. J. van den Boom Bart De Schutter

If you want to cite this report, please use the following reference instead: T.J.J. van den Boom and B. De Schutter, " Model predictive control for perturbed max-plus-linear systems, " Abstract Model predictive control (MPC) is a popular controller design technique in the process industry. Conventional MPC uses linear or nonlinear discrete-time models. Recently, we have extended MPC to a class ...

2012
Atsushi Inoue

In this paper I propose an alternative factor model whose common factor follows a mean-plus-noise process. While the existing methods for factor models should be valid for this model, their performance may be misleading in small samples. Because the likelihood function of this model is not tractable, I estimate this model by Bayesian methods. When applied to U.S. macroeconomic time series, we f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید