نتایج جستجو برای: abstractin recent years

تعداد نتایج: 1488116  

2015
Seth Jai Prakash

ABSTRACTIn today‟s library science, information and computer science, online text classification or text categorization is a huge complication. [1]With the enormous growth of online information and data, text categorization has become one of the crucial techniques for handling and standardizing text data. Various learning algorithms have been applied on text for categorization. On the basis of ...

2013
Ajay Sharma Sanjay Verma Anurag Garg

Ajay Sharma , C. Khare , Sanjay Verma , Anurag Garg 4 1 3 Electronics & Communication Department, S.V.I.T. INDORE/R.G.P.V. University Bhopal, India Electrical & Electronics Department, S.V.I.T. INDORE/R.G.P.V. University Bhopal, India 4 Electronics & Communication Department, IPS Gwalior/R.G.P.V. University Bhopal, India 1 [email protected] 2 [email protected] 3 Emailsanjayverma.me@...

2012
N. Nagarajan

AbstractIn Wireless Sensor Network transmission policy, topology control, routing, and MAC protocols, can play a vital role in extending network lifetime. In cooperative networks, transmitting and receiving nodes recruit, neighboring nodes to assist in communication. Due to the spatial correlation between sensor nodes, it may not be necessary for every sensor node to transmit its data. This pap...

Journal: :CoRR 2011
V. Sreedeep B. Ramkumar Harish M. Kittur

AbstractIn this work faster unsigned multiplication has been achieved by using a combination of High Performance Multiplication [HPM] column reduction technique and implementing a N-bit multiplier using 4 N/2-bit multipliers (recursive multiplication) and acceleration of the final addition using a hybrid adder. Low power has been achieved by using clock gating technique. Based on the proposed t...

2013
Christian Bayer John Schoenmakers WIAS Berlin J. SCHOENMAKERS

AbstractIn this paper we derive stochastic representations for the finite dimensional distributions of a multidimensional diffusion on a fixed time interval, conditioned on the terminal state. The conditioning can be with respect to a fixed point or more generally with respect to some subset. The representations rely on a reverse process connected with the given (forward) diffusion as introduce...

2002
Parameswaran Ramanathan Lun Tong

AbstractIn a Direct Sequence Code Division Multiple Access (DS-CDMA) based cellular network, meeting the diverse quality of service (QoS) needs of mobile hosts (MHs) is a challenge because of the fluctuations in the quality of the wireless channel. In this paper, the QoS needs of the MHs application are modelled using service curve. Furthermore, a notion of deviation is introduced as a measure ...

2003
Efrén Mezura-Montes Carlos A. Coello Coello

AbstractIn this paper, we propose the use of a Simple Evolution Strategy (SES) (i.e., a -ES with self-adaptation that uses three tournament rules based on feasibility) coupled with a diversity mechanism to solve constrained optimization problems. The proposed mechanism is based on multiobjective optimization concepts taken from an approach called the Niched-Pareto Genetic Algorithm (NPGA). The ...

2014
Satoshi FUJIKAWA Shinichi HARADA Shigeki ANDO

AbstractIn this study, the authors employ the topic of “Rotating Duty System” with the goal of developing collaborative learning in robot contest study, and examine how the system enhances language activities in technology education in Japan. This system is a learning system where a project is jointly carried out by a group, the group representative changes depending on the meeting content and ...

Journal: :SpringerBriefs in mathematics 2022

AbstractIn this chapter, we study the dynamics of (semi)flow \((2^X,T)\) where \(2^X\) is (metric)space nonempty closed subsets a compact X. We include some known results on topology and \((2^X,T)\). also new notions as well relation between (X, T) \((2^X,T)\).KeywordsInduced systemsTransitivityAlmost equicontinuousAlmost periodicRigidity

2013
Ajit Danti Rajesh Nayak

AbstractIn modern world, cryptography hackers try to break a cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message (data), by analyzing the insertion or presence of repetitive bits / characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید