نتایج جستجو برای: resilient back

تعداد نتایج: 170839  

2011
Karina Weichold Deepali Sharma

Many people around the globe experience severe stressors like war, earthquakes, or terrorist acts, and adversities such as poverty and family disruption which in most cases have negative effects on subsequent developmental pathways. However, not all individuals become as heavily affected by stressors as expected and show competence, thriving, and other positive outcomes instead of malfunction a...

Journal: :Annales des Télécommunications 2010
Ataollah Ebrahimzadeh Hamed Azimi

Automatic modulation recognition plays an important role for many novel computer and communication technologies.Most of the proposed systems can only identify a few kinds of digital signal and/or low order of them. They usually require high levels of signal-to-noise ratio. In this paper, we present a novel hybrid intelligent system that automatically recognizes a variety of digital signals. In ...

2007
Byungjoon Yoo Seungwoo Kwon Jinbae Kim Wei Shang Gunwoong Lee

Information and Communication Technologies (ICT) changed our everyday business drastically. Business routines have been transformed to online activities. New theories and models were developed for the brand new online environment. For online negotiations, however, the research on new mechanisms is not enough, especially for bilateral distributive negotiations. A reserve price reporting mechanis...

Journal: :Optical Switching and Networking 2005
Andrzej Jajszczyk

A general overview of the current status and future trends in optical networking is given. Special attention is given to the coexistence of optical and electronic technologies in telecommunications networks. After reviewing the advantages of both technologies, their use in different network areas is discussed. A critical survey of current and new transport technologies in optical core and metro...

2011
Marina Agranov Chloe Tergiman

When the performances of agents are correlated (because of a common random component) contracts that use information on both the relative and absolute performance of agents theoretically outperform rank-order tournaments and piece-rate schemes. Although the theoretical advantage of such contracts has long been noticed in the literature, the empirical papers that study this question have produce...

2005
Fredrik Davik Amund Kvalbein Stein Gjessing

Resilient Packet Ring (RPR IEEE 802.17) is an insertion buffer, dual ring technology, utilizing a back pressure based fairness algorithm to distribute bandwidth when congestion occurs. The fairness algorithm may oscillate and under some conditions the oscillations continue indefinitely even under stable load conditions. In this paper, we evaluate the latency experienced by packets sent during s...

2012
R Palacios F Navarro T Moreno J Ruiz E Nuño M Márquez J Santos

Methods Open-label, no controlled study of a series of HIV-patients diagnosed with syphilis during 2004 2011. Patients were categorized by rapid plasma reagin titer (RPR) into success (4-fold decrease in RPR by 12 or 24 months after treatment of early or late syphilis), serofast (success with persistently stable reactive RPR), and failure/re-infection (failure to decrease 4-fold in RPR by 12 or...

2015
H. Balaga D. N. Vishwakarma H. Nath

This paper presents the use of Artificial Neural Networks (ANN) as a pattern classifier for the combined differential protection of generator-transformer unit with an aim to build a backup protection system to improve the overall reliability of the system. The proposed neural network model is trained and tested with an efficient Resilient Back propagation (RPROP) algorithm and Genetic Algorithm...

Journal: :JNW 2009
Chenfeng Vincent Zhou Christopher Leckie Shanika Karunasekera

Phishing is a significant security threat to users of Internet services. Nowadays, phishing has become more resilient to detection and trace-back with the invention of Fast Flux (FF) service networks. We propose two approaches to correlate evidence from multiple DNS servers and multiple suspect FF domains. Real-world experiments show that our correlation approaches speed-up FF domain detection,...

2005
Aaditeshwar Seth Patrick Darragh Suihong Liang Yunfeng Lin Srinivasan Keshav

In the emerging paradigm of tetherless computing, client applications running on small, inexpensive, and smart mobile devices maintain opportunistic wireless connectivity with back-end services running on centralized computers, enabling novel classes of applications. These applications require a communications infrastructure that is mobility-aware, disconnection-resilient and provides support f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید