نتایج جستجو برای: suited hence
تعداد نتایج: 210333 فیلتر نتایج به سال:
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have performed studies on online/offline network devices such as routers and IDS/IPS. While, the task of deep packet inspection is powerfully handled by IDS/IPS, the real time processing ...
We propose certain non-Turing models of computation, but our intent is not to advocate models that surpass the power of Turing Machines (TMs), but to defend the need for models with orthogonal notions of power. We review the nature of models and argue that they are relative to a domain of application and are ill-suited to use outside that domain. Hence we review the presuppositions and context ...
Symbol detection in multi-input multi-output (MIMO) communication systems using different particle swarm optimization (PSO) algorithms is presented. This approach is particularly attractive as particle swarm intelligence is well suited for real-time applications, where low complexity and fast convergence is of absolute importance. While an optimal maximum likelihood (ML) detection using an exha...
Compression is useful because it helps us to reduce the resources use, such as data storage capacity or transference capacity. Compression methods have a many types. In this survey explain a different simple efficient data compression algorithm which suited to be used on available many commercial nodes of a wireless sensor network, where energy, memory and computational resources are limited. S...
We propose certain non-Turing models of computation, but our intent is not to advocate models that surpass the power of Turing machines (TMs), but to defend the need for models with orthogonal notions of power. We review the nature of models and argue that they are relative to a domain of application and are ill-suited to use outside that domain. Hence we review the presuppositions and context ...
Part Of Speech (POS) tagging is the most important pre-processing step in almost all Natural Language Processing (NLP) applications. It is defined as the process of classifying each word in a text with its appropriate part of speech. In this paper, the probabilistic classifier technique of Maximum Entropy model is experimented for the tagging of Kannada sentences. Kannada language is agglutinat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید