نتایج جستجو برای: false requirement
تعداد نتایج: 233291 فیلتر نتایج به سال:
social interaction requires the ability to understand people’s mental states (their intentions, desires and believes). the ability for attributing mental states is called “theory of mind.” theory of mind leads the person to explain and predict behavior. researchers showed a great interest in the relation of language and mind/language and thought. some researchers focused on methodological conce...
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no actual loss has occurred. These repeated false fast retransmits keep the sender’s window small, and severely degrade the throughput it attains. Persistent reordering occasionally occurs on present-day networks. Moreove...
M. B. Miller and G. L. Wolford (1999) make two contributions. First, they add conditions to the basic Roediger-McDermott (1995) procedure and find that critical items are recalled and recognized more often if they are presented in the list than if they are not presented. These results agree with our own, which are briefly reviewed. Second, they apply signal detection theory to the paradigm and ...
Perner (1991) has claimed that the linguistic structures and reasoning tasks mastered by 4-year-olds share a requirement to handle metarepresentation. In contrast, de Villiers (2000) has argued that they share a requirement to handle misrepresentation. In the current study, a correlation is observed between success on false belief tasks and the acquisition of relative clause sentences. This cor...
A spam detection model based on negative selection algorithm is proposed in this paper. The artificial immune system creates techniques to solve complex computations, aiming to developing immune based models. This is done by distinguishing self from non-self. Preliminary mathematical analysis will expose the computation and experimental description of the method and how it is applied to spam de...
Techniques in computer-aided learning offer significant benefits for explaining difficult concepts in a way that is both stimulating and efficient. In the context of the STORM system, we have employed computer-based animation as a means of elucidating complex concepts in the educational domain of Internet and communications technology. Our experience reveals two important lessons for the applic...
introduction. students' evaluation of teaching is a major concern in higher education. in this regard, during the past 30 years hundreds of papers have been published which because of various grounds from valid, reliable to useless, such papers cannot be easily summarized. the present study investigated for two purposes, first was to out line opinions of two groups of advocates and opposit...
A network component is said to be a single point of failure if its failure causes a critical end-to-end requirement to be falsified. Single points of failure are avoided by means of redundancy and various fault-tolerance protocols. However, planning for their avoidance from an end-to-end standpoint is a major challenge because constraints of different types need to be reconciled at and across m...
Currently used network-intrusion detection systems (NIDSs) using deep learning have limitations in processing large amounts of data real time. This is because collecting flow information and creating features are time consuming require considerable memory. To solve this problem, a novel NIDS with θ(1) memory complexity for proposed study. Owing to its small requirement, the model can handle num...
wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید