نتایج جستجو برای: demerits

تعداد نتایج: 913  

2011
Hitesh Tahbildar Bichitra Kalita

In this paper we are giving an overview of automatic test data generation. The basic objective of this paper is to acquire the basic concepts related to automated test data generation research. The different implementation techniques are described with their relative merits and demerits. The future challenges and problems of test data generation are explained. Finally we describe the area where...

2014
Jyoti Chauhan Anchal Jain

DNA Cryptography is a new born cryptography that overcomes the difficulties of traditional cryptography due to its extraordinary information density inherent in DNA molecules, exceptional energy efficiency and vast parallelism. A lot of work have been done in this area based on different techniques like –DNA synthesis, PCR, Electrophoresis etc. In this paper various trends in DNA Cryptography a...

2010
Kai Zeng Kannan Govindan Prasant Mohapatra

Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This article provides an overview about various non-cryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. We discuss merits and demerits of these authenti...

2005
Ashish Ghosh Satchidananda Dehuri

In this paper, we review some of the most popular evolutionary algorithms and a systematic comparison among them. Then we show its importance in single and multi-objective optimization problems. Thereafter focuses some of the multi-objective evolutionary algorithms, which are currently being used by many researchers, and merits & demerits of multi-objective evolutionary algorithms (MOEAs). Fina...

2010
Toshihiro Kamishima Hideto Kazawa Shotaro Akaho

Ordered lists of objects are widely used as representational forms. Such ordered objects include Web search results or bestseller lists. In spite of their importance, methods of processing orders have received little attention. However, research concerning orders has recently become common; in particular, researchers have developed various methods for the task of Object Ranking to acquire funct...

2012
Kailash Chandra Mishra

Nano technology has vast applications such as microscopic robots or travel inside the body to deliver drug or do micro surgery. One major requirement to carry out such activity is power. Here in my paper, I have studied the possible sources of power supply from within the body and supply from outside the body, their merits and demerits. I have studied the various factors and different situation...

2017
D. Kiran Kumar M. Kailasa Reddy Sanjay Singh Nguyen Thanh Hieu Arvind Chakrapani Zhongpeng Wang Shaozhong zhang

This paper briefs about the Partial Transmit Sequences for Peak-to-Average Power Ratio Reduction of OFDM Signals, PAPR reduction efficiency of this method in comparison with Companding and Clipping and some merits and demerits of using various methods of PAPR reduction. Based on the above survey the criteria for the selection of PAPR reduction is given and proposed scheme of combining PTS appro...

1988
Anuradha Khanna

In the second part of the study the author highlights the merits and demerits of the ancient Indian medicine and establishes that the system is more than a physical medicine because of (1) its monumental theoretical generalization reflect a serious preoccupation with life as a process involved in a ceaseless change and; (2) its underlying ideas have permeated both religion and philosophy and cr...

2013
Eliyahu Goldratt

The paper attempts to overcome the fluctuations occurring in demand of the components in an automotive sector company. Resource and time being the strict constraints, the production is not able to match the pace of the fluctuating demand. So, we introduce some production schedules that help in meeting out the required demand. The merits and demerits of the approaches are also highlighted. Keywo...

Journal: :JDIM 2008
Mohammed Misbahuddin P. Premchand A. Govardhan

Password based authentication schemes are commonly used to authenticate remote users. Many schemes have been proposed both with and without smart cards but each have its own merits and demerits. This paper analyzes the security of an enhanced Dynamic ID based remote user authentication scheme and shows that the enhanced scheme has major security weaknesses. The paper also presents a new scheme ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید