Showing 11,401 - 11,420 results of 28,739 for search '"computability"', query time: 0.11s Refine Results
  1. 11401

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
    Get full text
    Article
  2. 11402
  3. 11403
  4. 11404
  5. 11405
  6. 11406
  7. 11407
  8. 11408

    LSP transcoding method between 3GPP AMR-NB and ITU-T G.729A based on GMM by LIU Zhang-yu, BAO Chang-chun, QIU Jian-wei, XU Hao

    Published 2010-01-01
    “…An efficient transcoding algorithm of LSP(line spectrum pairs) parameters based on GMM(Gaussian mixture model) was proposed and implemented through the mathematical analysis of GMM.Meanwhile,several practical issues in details were analyzed under experiments.The experiments indicate that the computational complexity of the proposed LSP transcoding algorithm is reduced by above 78% and the transcoded speech quality is not worse than DTE method.…”
    Get full text
    Article
  9. 11409

    Application of SDN and NFV technology in the cloud data center by Hui ZHAO, Ming DING, Qingsong CHENG, Ling LU, Chensheng KONG

    Published 2016-01-01
    “…Taking the cloud computing data center as the breakthrough point,firstly,the characteristics of overlay network,SDN controller and VxLAN in SDN field were presented.Secondly,two kinds of problems about general server performance and service chain were analyzed in NFV field.Finally,the early test progress of SDN/NFV technology and related conclusions were expounded,then VDC was discussed.…”
    Get full text
    Article
  10. 11410

    Design of a multistage anti-jam GPS receiver by DI Min-min, ZHANG Er-yang

    Published 2005-01-01
    “…Finally the simulation results presented prove it is of advantage in decreasing computation complexity and improve anti-jam capability.…”
    Get full text
    Article
  11. 11411

    Laguerre-type Bell polynomials by P. Natalini, P. E. Ricci

    Published 2006-01-01
    “…The Laguerre-type Bell polynomials are useful in order to compute the nth Laguerre-type derivatives of a composite function. …”
    Get full text
    Article
  12. 11412

    On a theorem of B. Keller on Yoneda algebras of simple modules by Jasso, Gustavo

    Published 2024-11-01
    “…We provide a proof of an extension of Keller’s theorem to abelian length categories by reducing the problem to a particular class of Nakayama algebras, where the claim can be shown by direct computation.…”
    Get full text
    Article
  13. 11413

    Approach to weak signal extraction and detection via sparse representation by Ya-fei TANG, Yun-yong ZHANG, Zhi-bin GUO

    Published 2015-11-01
    “…The sparsity models and their popular evaluation algorithms were presented.A sparse representation based approach to weak signal extraction and detection was proposed.Furthermore,a fast algorithm was developed to reduce the computational complexity of the proposed method.In addition,both qualitative and quantitative evaluation methods were designed to analyze the proposed approach.A large number of experiments demonstrate the robustness and the adaptivity of the proposed approach.…”
    Get full text
    Article
  14. 11414

    “Primary Omental Hydatid Cyst”: A Rare Entity by Shailesh Sable, Jyoti Mehta, Sudeep Yadav, Priyadarshan Jategaokar, Premashish J. Haldar

    Published 2012-01-01
    “…Diagnosis can be achieved with contrast-enhanced computed tomography of abdomen and pelvis along with serology. …”
    Get full text
    Article
  15. 11415

    AN INCOMPATIBLE LAYERWISE METHOD FOR BENDING LAMINATED SHELLS by ZHANG Feng, YU YiLiang, ZHENG YiMei

    Published 2018-01-01
    “…Several examples are studied to validate the capabilities of proposed method.The numerical results indicate that The ILWM achieves better convergence rate and computational accuracy compared with LWM for bending models.…”
    Get full text
    Article
  16. 11416

    Five Open Problems on Designing 5G Network Architecture by Xiaodong Duan, Tao Sun, Wei Chen, Xiaoyong Han, Lu Lu

    Published 2014-10-01
    “…Virtualization, cloud computing and SDN are new technologies that enables innovative architecture design. …”
    Get full text
    Article
  17. 11417

    Anticontrol of Chaos for a Class of Delay Difference Equations Based on Heteroclinic Cycles Connecting Repellers by Zongcheng Li

    Published 2014-01-01
    “…An illustrative example is provided with computer simulations.…”
    Get full text
    Article
  18. 11418

    Teaching of programming in advanced course of informatics by Valentina Dagienė, Jonas Blonskis

    Published 2002-12-01
    “…The stages in teaching of prog­ramming are analyzed: basic computer skills, basic knowledge in programming, and developing of programs. …”
    Get full text
    Article
  19. 11419

    The Application of the Homotopy Analysis Method and the Homotopy Perturbation Method to the Davey-Stewartson Equations and Comparison between Them and Exact Solutions by Hassan A. Zedan, W. Barakati, Nada Hamad

    Published 2013-01-01
    “…Comparison of the HPM results with the HAM results, and compute the absolute errors between the exact solutions of the DS equations with the HPM solutions and HAM solutions are obtained.…”
    Get full text
    Article
  20. 11420

    The Laplacian-Energy-Like Invariants of Three Types of Lattices by Zheng-Qing Chu, Jia-Bao Liu, Xiao-Xin Li

    Published 2016-01-01
    “…In addition, we obtain explicit asymptotic values of these invariants with software-aided computations of some integrals.…”
    Get full text
    Article