• No results found

Two-Step

A two‐step authentication framework for Mobile ad hoc networks

A two‐step authentication framework for Mobile ad hoc networks

... when two-step authentication is ...the two-step authentication procedure adds extra overhead to the network, an overhead that must be evaluated vis as vis the specific application and the ...

9

Two Step Approach for Emotion Detection on Twitter Data

Two Step Approach for Emotion Detection on Twitter Data

... a two-step approach, it is so called as it uses two approaches for the classification process, one is Rule Based approach and the other is Machine Learning ...

8

Two step authentication with data de duplication in Cloud

Two step authentication with data de duplication in Cloud

... 1) By providing dynamic token on to the user’s Email_Id no attacker can receive the dynamic token which will be useful for two step authentication. 2) Session key i.e. dynamic token is generated from hash ...

5

Two-step LASIK after penetrating keratoplasty

Two-step LASIK after penetrating keratoplasty

... Many factors such as the size, curvature, and thickness of the corneal transplant, the underlying disease for the PK, preoperative refraction, the trephination technique, the type of suture, size and alignment of the ...

6

Two-step Methods for Differential Equation Models.

Two-step Methods for Differential Equation Models.

... the two- step approach for quantile regression performs better than that for mean regression in terms of the Monte Carlo bias and ...the two-step quantile regression estimator converges to ...

105

Is this the end? Two step tokenization of sentence boundaries

Is this the end? Two step tokenization of sentence boundaries

... second step we remove the ambiguity based on the linguistic context of the ...new two-step approach to tokenization improves the identification of sentence ...

13

One step and two step estimation of the effects of exogenous variables on technical efficiency levels

One step and two step estimation of the effects of exogenous variables on technical efficiency levels

... We also provide some new theoretical insights into the bias problem. It is widely appreciated that the severity of the bias in estimation of the technological parameters (coefficients of x) depends on the magnitude of ...

26

Convergence of two step iterative scheme with errors for two asymptotically nonexpansive mappings

Convergence of two step iterative scheme with errors for two asymptotically nonexpansive mappings

... A two-step iterative scheme with errors has been studied to approximate the common fixed points of two asymptotically nonexpansive mappings through weak and strong convergence in Banach [r] ...

7

Shaping of Helical Gear by Two Step Cold Extrusion

Shaping of Helical Gear by Two Step Cold Extrusion

... the two-step and conventional methods, ...the two- step method than in the conventional ...the two-step method, as indicated from the difference in the load-stroke curves shown in ...

6

Destination segmentation: a recommended two-step approach

Destination segmentation: a recommended two-step approach

... An additional contribution arising from this study is that the two-step approach provides a much richer description of the segments when compared to the current DMO segments. This richness can be applied to ...

53

Robust misspecification tests for the Heckman’s two-step estimator

Robust misspecification tests for the Heckman’s two-step estimator

... The assumption of bivariate normality provides efficient and easy-to- compute estimation procedures. Maximum likelihood estimates (MLE) and two-step procedures are available in all statistical packages. ...

41

Two‐Step Authentication in Mobile Ad Hoc Networks

Two‐Step Authentication in Mobile Ad Hoc Networks

... second step of the authentication, node authentication is essential before routing information is ready to be ...in two-step authentication will not rely only on the apparent intractability of a ...

9

Square-wave Voltammetry of Two-step Electrode Reaction

Square-wave Voltammetry of Two-step Electrode Reaction

... of two-step electrode reaction with kinetically controlled electron transfers is developed and a special case of thermodynamically unstable intermediate is ...

10

A Two step Approach to Sentence Compression of Spoken Utterances

A Two step Approach to Sentence Compression of Spoken Utterances

... a two-step approach to compress spontaneous spoken ...first step, we use a sequence labeling method to determine if a word in the utterance can be removed, and generate n-best com- pressed ...second ...

5

Two step translation with grammatical post processing

Two step translation with grammatical post processing

... Our two-step translation is essentially the same setup as detailed by Bojar and Kos (2010): (1) the English source is translated to simplified Czech, and (2) the simplified Czech is monotonically trans- ...

7

Two-Step Machine Translation with Lattices

Two-Step Machine Translation with Lattices

... of two-step machine translation was introduced to divide the complexity of the search space into two independent steps: (1) lexical translation and reordering, and (2) conjugation and declination in ...

5

One step and Two step Classification for Abusive Language Detection on Twitter

One step and Two step Classification for Abusive Language Detection on Twitter

... a two-step approach of combin- ing two classifiers - one to classify abusive lan- guage and another to classify a specific type of sexist and racist comments given that the lan- guage is ...the ...

5

A Two-Step Synthesis of 2-Spiropiperidines

A Two-Step Synthesis of 2-Spiropiperidines

... selection of cyclic (4-6 membered ring) ketones containing O, S or N-heteroatoms all reacted smoothly with the -amino-- ketoester to give the desired piperidines 4a-s. The two-step procedure is easy to ...

5

Acetaldehyde and salsolinol in ethanol’s two-step mechanism of action: An overview

Acetaldehyde and salsolinol in ethanol’s two-step mechanism of action: An overview

... attention must be paid to assess the consequences of perinatal ACD and SAL exposure, that could be enduring and outlast ado- lescence and adulthood. Given the paucity of data on this topic, this review is also to be ...

7

Two-step semiparametric empirical likelihood inference

Two-step semiparametric empirical likelihood inference

... used two-step (plug-in) empirical likelihood ratio is not asymp- totically distribution-free, that is, its asymptotic distribution contains unknown quantities and hence Wilks’ theorem breaks ...in ...

35

Show all 10000 documents...

Related subjects