نتایج جستجو برای: nsa method

تعداد نتایج: 1636362  

2017
Feng Gu Julie Greensmith Uwe Aickelin

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of different implementation versions of the DCA, including antigen multiplier and moving time windows, are reported. The real-valued Negative Selection Algori...

2015
Ismaila Idris Ali Selamat

The increased nature of email spam with the use of urge mailing tools prompt the need for detector generation to counter the menace of unsolocited email. Detector generation inspired by the human immune system implements particle swarm optimization (PSO) to generate detector in negative selection algorithm (NSA). Outlier detectors are unique features generated by local outlier factor (LOF). The...

2003
Louis Kauffman Robin Thomas

The Temperley-Lieb algebra Tn with parameter 2 is the associative algebra over Q generated by 1, e0, e1, . . . , en, where the generators satisfy the relations ei = 2ei, eiejei = ei if |i − j| = 1 and eiej = ejei if |i − j| ≥ 2. We use the Four Color Theorem to give a necessary and sufficient condition for certain elements of Tn to be nonzero. It turns out that the characterization is, in fact,...

2007
Samuel S. Silva Frutuoso G. M. Silva Joaquim Madeira Beatriz Sousa Santos

Polygonal meshes are used in many application scenarios. Often the generated meshes are too complex not allowing proper interaction, visualization or transmission through a network. To tackle this problem, simplification methods can be used to generate less complex versions of those meshes. For this purpose many methods have been proposed in the literature and it is of paramount importance that...

Journal: :Journal of Automated Reasoning 2021

The Tokeneer project was an initiative set forth by the National Security Agency (NSA, USA) to be used as a demonstration that developing highly secure systems can made applying rigorous methods in cost-effective manner. Altran UK selected NSA carry out development of ID Station. company wrote Z specification later implemented SPARK Ada programming language, which verified using Examiner toolse...

Journal: :Jurnal Economia 2023

Border areas are the gateway for a country;generally, it is an underdeveloped area. This study aims to develop economy based on only commodities in National Strategic Activity Center (NSA) Melongguane, Kepulauan Talaud Regency, North Sulawesi Province. uses qualitative and quantitative approaches. The approach policy formulation of Provincial government namely Regional Spatial Planning (RTRW) d...

Journal: :IEEE Access 2022

The Dual connectivity (DC) technology is a robust solution for Internet service providers (ISP) to evolve their legacy infrastructures with less cost speed up the progress of fifth-generation (5G) services coverage. DC enables traditional network connect multiple New Radio (NR) Node B (gNBs). A well-known scheme non-standalone (NSA) NR. In this case, user equipment (UEs) could access via both e...

2012
I..

WASHINGTON ( C P S ) — When a young man is sentenced to 20 years in prison for selling an ounce of marijuana, a drug called by top researchers a "relatively mild intoxicant," and yet the use of marijuana is growing and spreading from coffee houses to fraternity houses, what hasi happened ? The National Student Association (NSA) and the American Civil Liberties Union (ACLU) have decided that wha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید