841 results found.
Year: 2014, Volume: 14, Number: 4
... the first approach can offer This variance in self-similarity over data captured by better false positive rates, the second can detect both NEAR agent suggests that any detection system designed intrusions and other types of anomalies, even ones that have for these series must be evaluated both against sample data never been seen before. with low Hurst ...
Terms matched: 1 - Score: 6 - 1,185k
Year: 2009, Volume: 9, Issue: 1
... to: artificial ants cooperates in finding good solutions to „ rs=( 1 ρ )„ rs (14) difficult optimization problems. Cooperation is a key design component of ACO algorithms: The choice is to allocate the Where ρ is the evaporation rate with 0 ρ< 1 and (1-ρ) is computational resources ...
Terms matched: 1 - Score: 6 - 600k
Year: 2016, Volume: 16, Number: 4
... be strongly affected with cm and weight: 79 kg. noise. Because of that, in this research appropriate filter Our proposed method has been compared with CNLS design and implementation are discussed in Section II.B. fitting regarding accuracy and processing time in frequency Compared to the CNLS data fitting approach, advantages range of 1 kHz ...
Terms matched: 1 - Score: 6 - 1,242k
Year: 2007, Volume: 7, Issue: 2
... both Our proposed model overcomes these weaknesses by: client and server has led to changes in the way games are € Extending the network based model to include all designed and developed for online purposes. The work of parameters-packet loss must be considered in the Mauve [6] and the proposal for a Real-Time Transport bandwidth-intensive application ...
Terms matched: 1 - Score: 6 - 499k
Year: 2020, Volume: 20, Number: 1
... as a maximum likelihood estimation problem, Universities (2018MS006) and State Grid Science and Technology Project which can be solved by well-known expectation of China (Research and Design of System Level Control Protection maximization (EM) algorithm [18-19]. However, EM Technology Framework for Extra Large Power Grid) (SGBJDK00KJJS1900088) algorithm ...
Terms matched: 1 - Score: 6 - 876k
Year: 2023, Volume: 23, Number: 1
... 2013 streams," IEEE Transactions on Signal Processing, vol. 59, no. 4, pp. [33] G. Kalivas, Digital radio system design. Chichester, U.K.: Wiley, 1505 €“ 1517, Apr. 2011. doi:10.1109/tsp.2010.2103067 2009. doi:10.5555/1824033 [ ...
Terms matched: 1 - Score: 5 - 3,221k
Year: 2012, Volume: 12, Number: 3
... PCD are labeled and segmented. by nC € 1 ƒ n p( p ƒŽ Ci). The coefficient w ƒŽ [0 ,1] is designed i €1 according to objects "type": if the fusion is based on normal only, w € 0; respectively w € 1 ...
Terms matched: 1 - Score: 5 - 838k
Year: 2022, Volume: 22, Number: 2
... . Barenghi, G. Pelosi, Y. Teglia, "Information leakage discovery "New cross correlation attack methods on the Montgomery Ladder techniques to enhance secure chip design," International Workshop on implementation of RSA," IEEE International Advance Computing Information Security Theory and Practices, pp. 128-143, June 2011. Conference- ...
Terms matched: 1 - Score: 5 - 1,199k
Year: 2019, Volume: 19, Number: 2
... 2008, Helsinki University of 313, Jan. 2017. doi:10.1049/iet-gtd.2016.0791 Technology. [10] E. Kabalcı, "An islanded hybrid microgrid design with decentralized [25] T. Vigneysh, N. Kumarappan, "Autonomous operation and control of DC and AC subgrid controllers," Energy, vol ...
Terms matched: 1 - Score: 5 - 1,471k
Year: 2010, Volume: 10, Issue: 2
... n}, j ” {1 ,€, [6] J. Chen, D. J. DeWitt, J. F. Naughton, "Design and evaluation of m}, ci c'j, where p(R) is a predicate with attributes from R alternative selection placement strategies in optimizing continuous queries ...
Terms matched: 1 - Score: 5 - 620k