نتایج جستجو برای: quick scheme

تعداد نتایج: 251312  

2003
François Blanchy Laurent Mélon Guy Leduc

In the context of Multiprotocol Label Switching (MPLS), we propose an integration of a computationally efficient preemption mechanism into a very dynamic Label Switched Paths (LSPs) routing scheme described in a previous paper. This preemption scheme includes a quick heuristic able to select the most interesting LSPs to reroute from a link. The efficiency of this algorithm is obtained through a...

2005
Michael N. Fienen Jian Luo Peter K. Kitanidis

We present an algorithm for the quick delineation of capture zones using complex discharge potential. The flow is steady and two-dimensional in a homogeneous domain with anisotropic transmissivity. The procedure accommodates an arbitrary number of injection and extraction wells at any locations throughout the flowfield, as well as regional flow, in the form of a uniform flow component. Capture ...

2003
O Pujol D Rotger P Radeva O Rodriguez J Mauri

This article is devoted to the creation of a near-real time framework to discriminate between tissue and blood. We perform a fast supervised learning of local texture patterns of the plaque using Local Binary Patterns. A classifier is build by assembling weak classifiers using boosting schemes that allow quick performance and reliability. After that, a deformable model is used to ensure continu...

Journal: :JCP 2013
Jianxian Cai Lixin Li

To solve the navigation problem of mobile robot in unknown environment, a navigation scheme based on bionic strategy was proposed, which simulates operant conditioning mechanism. In this scheme, the tendency cell was designed by use of information entropy, which represents the tendency degree for state. The improved Q learning algorithm used as learning core to direct the learning direction. Th...

Journal: :J. Intelligent Systems 2017
Seema B. Hegde B. Satish Babu Pallapa Venkataram

Abstract: Resource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on. Pooling of resources can be accomplished using the distributed and dynamic nature of ad hoc networks to achieve collaboration between the devices. Ad hoc networks need a resource-pooling technique t...

Journal: :CoRR 2016
Iryna Kononenko Oleksiy Kononenko

In this work we study the dynamic behaviour of compound shells of revolution partially filled with an ideal incompressible fluid based on boundary-value problems. New analytical mathematical model with corresponding discrete scheme for the elastic displacements and the dynamic liquid pressure is developed. The discrete scheme is based on the method of discrete singularities. A code to perform t...

Journal: :JNW 2011
Xing Zhang Jingsha He Qian Wei

Wireless sensor networks have been used widely in many application fields, whereas such applications as battlefield information obtaining, disaster survivor rescuing, etc. need an immediate and fast route that is simultaneously secure and energy-efficient. In this paper, by constructing a neighbor table, we build a tree-structure route that can meet all the above requirements for the large-size...

Journal: :JCIT 2009
Yu-Lung Lo Ling-Yi Tsai

For the music database retrieval, the researchers extract the features, such as melodies, rhythms and chords, from the music data and develop indices to support the quick music search. Several reports have pointed out that these features can be transformed and represented in the forms of music feature strings or numeric values such that string indexing or numeric indexing is created, respective...

2009
Liang Cai Gabriel Maganis Hui Zang Hao Chen

Paging is an important mechanism for network bandwidth efficiency and mobile terminal battery life. It has been widely adopted by mobile networks, such as cellular networks, WiMax, and Mobile IP. Due to certain mechanisms for achieving paging efficiency and the convergence of wireless voice and data networks, the paging channel is vulnerable to inexpensive DoS attacks. To mitigate these attacks...

2015
Kapil Kumar Anurag Jain

Cloud computing is a technology in which data can be stored and access at remote server without the installation of software as well as hardware being installed at client side. The quick growth in field of “cloud computing” has also increased data security concerns. Security is a constant issue for open systems and internet. When we are thinking about security, cloud really suffers a lot. Lack ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید