نتایج جستجو برای: false requirement
تعداد نتایج: 233291 فیلتر نتایج به سال:
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no actual loss has occurred. These repeated false fast retransmits keep the sender’s window small, and severely degrade the throughput it attains. Persistent reordering occasionally occurs on present-day networks. Moreove...
Labeled graphs are widely used to model complex data in many domains, so subgraph querying has been attracting more and more attention from researchers around the world. Unfortunately, subgraph querying is very time consuming since it involves subgraph isomorphism testing that is known to be an NP-complete problem. In this paper, we propose a novel coding method for subgraph querying that is ba...
Automated Prognostics and Health Management (PHM) is a requirement for advanced military aircraft. PHM is the key to achieving true condition-based maintenance. PHM processing strategies include modules for the processing of known nominal and fault conditions. However in real operations there will also occur faults and other off-nominal operations that were never anticipated nor ever encountere...
A Bloom Filter (BF) is a data structure suitable for performing set membership queries very efficiently. A Standard Bloom Filter representing a set of n elements is generated by an array of m bits and uses k independent hash functions. Bloom Filters have some attractive properties including low storage requirement, fast membership checking and no false negatives. False positives are possible bu...
The leaky coaxial cable (LCX) based intruder detection system detects intruders by making efficient use of time-variation of the channel impulse response among the cables. Recently, a compressed sensing (CS)-assisted intruder detection system has been proposed for improving the accuracy of the intruder detection. Although the CS-assisted system can improve the false detection probability perfor...
In 38 patients who underwent cerebrovascular evaluation followed by angiography the Doppler ultrasound scanning technique was found to be an excellent screening procedure for detecting marked stenosis (>50%) or occlusion of the internal carotid artery (93% correlation). It is noninvasive, easily reproducible and can be performed by a qualified technician. The major problems are: the inability t...
Cognitive Radio is an emerging technology which avoids the congestion in wireless communication by exploiting unused radio spectrum . The Spectrum sensing plays a fundamental requirement of CR which finds an unused free spectrum and detects the licensed user transmissions. Energy detection constitutes a preferred approach for cognitive rdio spectrum sensing due to its simple applicability. In t...
A biometric system which relies only on a single biometric identifier in making a personal identification is often not able to meet the desired performance requirement. The basic aim of a biometric identify system is to make distinction automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal Biometric systems aim to fuse two or mor...
At present, applications of biometrics are rapidly increasing due to inconveniences in using traditional passwords and physical keys. Hand geometry, one of the most well-known biometrics, is implemented in many verification systems with various feature extraction methods. In recent work, a hand geometry verification system using time series conversion techniques and Dynamic Time Warping distanc...
The Internet has been widely applied in various fields, network security issues emerge and catch people’s attention and then launch attacks. For this reason, developers have proposed a lot of trace back schemes to take out the source of these attacks. Some uses to combine packet marking with packet logging and therefore create hybrid IP trace back schemes. In packet logging no need to refresh t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید