نتایج جستجو برای: nsa method
تعداد نتایج: 1636362 فیلتر نتایج به سال:
As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of different implementation versions of the DCA, including antigen multiplier and moving time windows, are reported. The real-valued Negative Selection Algori...
The increased nature of email spam with the use of urge mailing tools prompt the need for detector generation to counter the menace of unsolocited email. Detector generation inspired by the human immune system implements particle swarm optimization (PSO) to generate detector in negative selection algorithm (NSA). Outlier detectors are unique features generated by local outlier factor (LOF). The...
The Temperley-Lieb algebra Tn with parameter 2 is the associative algebra over Q generated by 1, e0, e1, . . . , en, where the generators satisfy the relations ei = 2ei, eiejei = ei if |i − j| = 1 and eiej = ejei if |i − j| ≥ 2. We use the Four Color Theorem to give a necessary and sufficient condition for certain elements of Tn to be nonzero. It turns out that the characterization is, in fact,...
Polygonal meshes are used in many application scenarios. Often the generated meshes are too complex not allowing proper interaction, visualization or transmission through a network. To tackle this problem, simplification methods can be used to generate less complex versions of those meshes. For this purpose many methods have been proposed in the literature and it is of paramount importance that...
The Tokeneer project was an initiative set forth by the National Security Agency (NSA, USA) to be used as a demonstration that developing highly secure systems can made applying rigorous methods in cost-effective manner. Altran UK selected NSA carry out development of ID Station. company wrote Z specification later implemented SPARK Ada programming language, which verified using Examiner toolse...
Border areas are the gateway for a country;generally, it is an underdeveloped area. This study aims to develop economy based on only commodities in National Strategic Activity Center (NSA) Melongguane, Kepulauan Talaud Regency, North Sulawesi Province. uses qualitative and quantitative approaches. The approach policy formulation of Provincial government namely Regional Spatial Planning (RTRW) d...
The Dual connectivity (DC) technology is a robust solution for Internet service providers (ISP) to evolve their legacy infrastructures with less cost speed up the progress of fifth-generation (5G) services coverage. DC enables traditional network connect multiple New Radio (NR) Node B (gNBs). A well-known scheme non-standalone (NSA) NR. In this case, user equipment (UEs) could access via both e...
WASHINGTON ( C P S ) — When a young man is sentenced to 20 years in prison for selling an ounce of marijuana, a drug called by top researchers a "relatively mild intoxicant," and yet the use of marijuana is growing and spreading from coffee houses to fraternity houses, what hasi happened ? The National Student Association (NSA) and the American Civil Liberties Union (ACLU) have decided that wha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید
