نتایج جستجو برای: suited hence

تعداد نتایج: 210333  

2012
Sneha S. Rana T. M. Bansod

IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have performed studies on online/offline network devices such as routers and IDS/IPS. While, the task of deep packet inspection is powerfully handled by IDS/IPS, the real time processing ...

2003
Bruce J. MacLennan

We propose certain non-Turing models of computation, but our intent is not to advocate models that surpass the power of Turing Machines (TMs), but to defend the need for models with orthogonal notions of power. We review the nature of models and argue that they are relative to a domain of application and are ill-suited to use outside that domain. Hence we review the presuppositions and context ...

Journal: :Int. J. Communication Systems 2008
Adnan Ahmed Khan Sajid Bashir Muhammad Naeem Syed Ismail Shah Xiaodong Li

Symbol detection in multi-input multi-output (MIMO) communication systems using different particle swarm optimization (PSO) algorithms is presented. This approach is particularly attractive as particle swarm intelligence is well suited for real-time applications, where low complexity and fast convergence is of absolute importance. While an optimal maximum likelihood (ML) detection using an exha...

2015
A.Alish Preethi Anjali Ramakrishnan

Compression is useful because it helps us to reduce the resources use, such as data storage capacity or transference capacity. Compression methods have a many types. In this survey explain a different simple efficient data compression algorithm which suited to be used on available many commercial nodes of a wireless sensor network, where energy, memory and computational resources are limited. S...

Journal: :Theor. Comput. Sci. 2004
Bruce J. MacLennan

We propose certain non-Turing models of computation, but our intent is not to advocate models that surpass the power of Turing machines (TMs), but to defend the need for models with orthogonal notions of power. We review the nature of models and argue that they are relative to a domain of application and are ill-suited to use outside that domain. Hence we review the presuppositions and context ...

2012
Ramakanth Kumar Aniket Dalal Kumar Nagaraj Uma Sawant Sandeep Shelke Siva Reddy Serge Sharoff

Part Of Speech (POS) tagging is the most important pre-processing step in almost all Natural Language Processing (NLP) applications. It is defined as the process of classifying each word in a text with its appropriate part of speech. In this paper, the probabilistic classifier technique of Maximum Entropy model is experimented for the tagging of Kannada sentences. Kannada language is agglutinat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید