• No results found

link technique-based algorithms

Adaptive link selection algorithms for distributed estimation

Adaptive link selection algorithms for distributed estimation

... adaptive link selection algorithms for distributed esti- mation problems are proposed and studied in this ...adaptive link selection algorithms that can exploit the knowledge of poor links by ...

22

A Link Distribution Algorithm with Efficient Relay Node Optimization for Congestion Control in Urban Vanets

A Link Distribution Algorithm with Efficient Relay Node Optimization for Congestion Control in Urban Vanets

... i.e. Link distribution algorithm and efficient link distribution ...A Link distribution algorithm is the distribution of the link to the nodes so that communication between the nodes takes ...

5

An Unsupervised Model to detect Web Spam based on Qualified Link Analysis and Language Models

An Unsupervised Model to detect Web Spam based on Qualified Link Analysis and Language Models

... learning algorithms to characterize the web pages based on the link based features and content based features to compare the difference between the various sources of information in the ...

5

Camera calibration optimization technique based on genetic algorithms

Camera calibration optimization technique based on genetic algorithms

... and link associated the actual optimal problems with genetic algorithm,It will express the optimal objective as a function of influencing factors, through the evaluation of population fitness value of each ...

7

Efficient Hybrid Usage Based Ranking Model

Efficient Hybrid Usage Based Ranking Model

... rank algorithms use Link-based ranking (web composition) or Content-based ranking to estimate the relevancy of the info to the user's need, but those rank algorithms might be ...

6

Image in image Steganography Technique based on Arnold Transform and LSB Algorithms

Image in image Steganography Technique based on Arnold Transform and LSB Algorithms

... In Steganography, the technique Peak Signal-to-Noise Ratio (PSNR), Normalized Correlation (NC) is a standard measure used in order to test the quality of the stego images. The PSNR is used to evaluate the ...

8

Smartphone Based Anti Spoofing Technique

Smartphone Based Anti Spoofing Technique

... Finally face acknowledgment network has begun spending a great deal of thoughtfulness regarding the since quite a while ago ignored drawback of mocking assaults [12]. As a result of fluctuated nature of assault ...

5

Scale the Active Influence Based Investigation Using Materialized Sub Graphs

Scale the Active Influence Based Investigation Using Materialized Sub Graphs

... Keyword based Searching, Concept-based Searching, Hybrid Search, and Knowledge Base ...domain based search is ...domain based information retrieval, which states that every owner of the ...

6

The Use of Evolutionary Algorithms for Optimization in the Modern Entrepreneurial Economy: Interdisciplinary Perspective

The Use of Evolutionary Algorithms for Optimization in the Modern Entrepreneurial Economy: Interdisciplinary Perspective

... evolutionary algorithms as the broadly applied search and optimisation technique based on Darwin’s theory of evolution and modern natural ...evolutionary algorithms application in economics ...

14

Reduction of Papr and Picr in Ofdm Signals With Slm-Pts And Peak Cancellation

Reduction of Papr and Picr in Ofdm Signals With Slm-Pts And Peak Cancellation

... Injection Technique is to increase constellation size by mapping the points from original constellation into various equivalent points in the expanded ...this technique is similar to multicarrier signal ...

7

A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces

A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces

... Abstract—These instructions give you guidelines for Smart crawler. As deep web grows, there has been increased interest in techniques that help efficiently locate deep-web interfaces. Due to the large volume of web ...

6

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... Clustering is one of the data mining techniques that is used to divide a dataset into meaningful groups. The main task of clustering analysis is to group a set of objects as “close” as possible in the same group and as ...

10

Comparative Study on Email Spam Classifier Using Feature Selection Techniques

Comparative Study on Email Spam Classifier Using Feature Selection Techniques

... CHAID, proposed by Kass in 1980, is a derivative if AID (Automatic Interaction Detection), proposed by Hartigan in 1975. CHAID attempts to stop growing the tree before overfitting occurs. In the standard manner, the ...

13

Online Full Text

Online Full Text

... Fig. 4 shows the dynamic system control configuration with FLPRFNS controller and Fig. 5 shows the system trajectories after 300 training cycles of Example: (solid line: desired trajectory; dashed line: system actual ...

6

UK 2007 data set has been used for

UK 2007 data set has been used for

... of link-based search engines like Google, that combat well with spamming, better ranking for the results was being ...seen. Link-based algorithms like Page Rank and HITS proved to be ...

6

A Survey on Multiword Smart Crawler for Effective Web Searching

A Survey on Multiword Smart Crawler for Effective Web Searching

... with link ranking. However, link ranking may introduce bias for highly relevant links in certain ...a link tree for a balanced link prioritizing In this example, servlet directory is for ...

5

A Method of Solving Travelling Salesman Problem

A Method of Solving Travelling Salesman Problem

... The architecture of algorithm is being implemented for solving the TSP through genetic algorithm and BB technique. Consider a set of 20 cities and 6 different routes. The cities are represented in a graph ...

7

A Stochastic Bicriteria Procedure for Creating    System Options

A Stochastic Bicriteria Procedure for Creating System Options

... MGA technique: (i) Population-based algorithms can be effectively employed as the underlying optimization search procedure for SO routines; (ii) Population-based solution searches can ...

8

Long Term Evolution Planning and Optimization based Downlink Scheduling

Long Term Evolution Planning and Optimization based Downlink Scheduling

... The necessity for high data rate mobiles is fast growing. New data steam applications, online gaming and high speed applications are very quickly evolved. The Third Generation Partnership Project (3GPP) offered a full ...

11

A Novel Technique for Mean Filtering Algorithms Based on Systolic Architecture

A Novel Technique for Mean Filtering Algorithms Based on Systolic Architecture

... Proposed technique: The proposed technique depends on the fact that the new window is highly similar to the previous one (Zhang and Li, 2014) (for 3*3 mask window, similarity of ...traditional ...

9

Show all 10000 documents...

Related subjects