搜索资源列表
5
- Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
10_things_about_being_great_it_manager
- IT Managers can easily get caught up in day-to-day operations and activities and lose sight of important management behaviors. Whether you re a new or seasoned manager, the following suggestions can help you be a great IT manager.
pyramid
- pyramid.cpp : Defines the class behaviors for the application.
Assignment-1-ACN-Waqas-Ahmed
- Please see the information about different network entities and their behaviors in the communication system.
LInear
- Secure and Practical Outsourcing of Linear Programming in Cloud Computing Abstract—Cloud computing enables customers with limited computational resources to outsource large-scale computational tasks to the cloud, where massive computational p
Characteristics-of-fish-behaviors
- 基于仿真技术的鱼群行为检测,能通过检测鱼在游动过程中的行为来判定鱼是否健康-Based on simulation technology fish behavior detection, detection of fish swimming through the process to determine the behavior of the fish is healthy
HAO1
- 本文提供了一个分析 复杂的动态显示当前模式控制 开关电源转换器。电流型控制的提高 转换器与非线性分析和研究 离散建模方法已被使用。通过改变 电路参数、混乱和复杂的行为 分歧发生在开关电源转换器。为 增加稳定period-l操作范围,坡道 已经被改变其使用和补偿方法 转换器的边坡,其效果将被显示。最后, 最大平均Iyapunov指数不同的斜坡上 审查和模拟。-The present article provides an analysis of complex dy
16-aee
- The output characteristic of a photovoltaic array is nonlinear and changes with solar irradiation and the cell’s temperature. Therefore, a Maximum Power Point Tracking (MPPT) technique is needed to draw peak power the solar array to maximize the
Understanding-Trajectory-Behavior---A-Motion-Patt
- Analysing patterns in gigantic and complex data: A motion pattern approach to mine frequent behaviors in trajectory data.
cat-swarm-optimization
- In this paper, we present a new algorithm of swarm intelligence, namely, Cat Swarm Optimization (CSO). CSO is generated by observing the behaviors of cats, and composed of two sub-models, i.e., tracing mode and seeking mode, which model upon th
State-space-model-2
- Generating diverse behaviors with a humanoid robot requires a mix of human supervision and automatic control. Ideally, the user’s input is restricted to high-level instruction and guidance, and the controller is intelligent enough to accompli
ohno2000
- Analysis and Modeling of Human Driving Behaviors Using Adaptive
5
- . To solve the mode mixing problem, a noise‐assisted data analysis method called ensemble empirical mode decomposition (EEMD) is adopted instead of EMD. In this paper, the applications of EMD and EEMD on time–frequency analyzing behaviors were compar
Types_and_Programming_Languages.pdf.tar
- A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute.
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also