"Knearest neighbor algorithm" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 37 of 50 - About 500 Essays
  • Powerful Essays

    Internetworking with Ipv6

    • 8595 Words
    • 35 Pages

    Master of Science In Management and Information Technology Network Management MGIT 62152 Internetworking with IPv6 Group 6 Sanjeewa Rathnayake - (FGS/M.Sc/MIT/2010/003) S. A. Ranamukage - (FGS/M.Sc/MIT/2010/026) Sandun Fernando - (FGS/M.Sc/MIT/2010/029) Date: January 19‚ 2012 Department of Industrial Management‚ Faculty of Science‚ University of Kelaniya‚ Sri Lanka Table of Contents List of Figures 4 List of Tables 4 1.0 Introduction 4 2.0 Brief Introduction

    Premium IP address Internet Protocol

    • 8595 Words
    • 35 Pages
    Powerful Essays
  • Satisfactory Essays

    Wei Zhou LinkedIn

    • 1435 Words
    • 21 Pages

    Wei Zhou | LinkedIn https://www.linkedin.com/profile/view?id=231105070&authTy... Click to Close $ # % Advanced resume ’ & ( Wei Zhou Data Scientist at Skyhigh Networks linkedin Like (5) Comment (1) Share Link Tiansheng Yao‚ Bo Zeng and 3 others like this Bo Zeng diao Wei Zhou 16 hours ago 1st Data Scientist at Skyhigh Networks Stanford‚ California Previous Education Computer Software Stanford University‚ Visa‚ National Development and Reform Commission Stanford University 355

    Premium Data mining Data analysis Statistics

    • 1435 Words
    • 21 Pages
    Satisfactory Essays
  • Powerful Essays

    Recommendation Sys

    • 18221 Words
    • 73 Pages

    Design and Evaluation of a Recommender System INF-3981 Master’s Thesis in Computer Science Magnus Mortensen Faculty of Science Department of Computer Science University of Tromsø February 5‚ 2007 Design and Evaluation of a Recommender System INF-3981 Master’s Thesis in Computer Science Magnus Mortensen Faculty of Science Department of Computer Science University of Tromsø February 5‚ 2007 Abstract In the recent years‚ the Web has undergone a tremendous growth

    Premium Information retrieval Information systems

    • 18221 Words
    • 73 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    transmission of routing information? Correct Response Your Response DUAL IP PDM RTP TCP UDP Bottom of Form This item references content from the following areas: CCNA Discovery: Introducing Routing and Switching in the Enterprise 5.3.4 EIGRP Neighbors and Adjacencies 4 Top of Form A network administrator issues the command show ip route and observes this line of output: 192.168.3.0/24 [120/2] via 192.168.2.2‚ 00:00:05‚ Serial0/0 What two pieces of information can be obtained from the output

    Premium Routing Routing protocol Computer network

    • 1313 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Networking

    • 3910 Words
    • 16 Pages

    the designated port for network segment e is the port that connects bridge 92 to network segment e. 5. This diagram illustrates all port states as computed by the spanning tree algorithm. Any active port that is not a root port or a designated port is a blocked port. 6. After link failure the spanning tree algorithm computes and spans new least-cost tree. Select a root bridge. The root bridge of the spanning tree is the bridge with the smallest (lowest) bridge ID. Each bridge has a configurable

    Premium Ethernet

    • 3910 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    in Multihop Wireless Networks‚” in The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02)‚ Lausanne‚ Switzerland‚ June 2002‚ pp. 12–23. [6] S. Murthy‚ “Routing in Packet-Switched Networks Using Path-Finding Algorithms‚” Ph.D. dissertation‚ University of California - Santa Cruz‚ 1156 High Street‚ Santa Cruz‚ CA 95064‚ United States‚ 1996. [7] S. Murthy and J. J. Garcia-Luna-Aceves‚ “An Efficient Routing Protocol for Wireless Networks‚” Mobile Networks and Applications

    Premium Computer network Routing Computer networking

    • 3080 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Utility Fog

    • 3310 Words
    • 14 Pages

    CONTENTS 1. Introduction 2. Concepts of UTILITY FOG 2.1 Structure 2.2 Working 2.3 Properties 3. Implementation 3.1 Self Reconfiguring Robots 3.2 Homogenous Self Reconfiguring Robots 3.3 Crystalline module concept 3.4 Design 3.5 Motion and Control 4. Applications 5. Problems 6. Conclusion References Chapter 1 INTRODUCTION: The Idea of Utility fog was originally put forward by Edison in 1890. These tiny

    Premium Atom Robotics Robot

    • 3310 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Face Recognition

    • 33246 Words
    • 133 Pages

    REVIEWS‚ REFINEMENTS AND NEW IDEAS IN FACE RECOGNITION Edited by Peter M. Corcoran Reviews‚ Refinements and New Ideas in Face Recognition Edited by Peter M. Corcoran Published by InTech Janeza Trdine 9‚ 51000 Rijeka‚ Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license‚ which permits to copy‚ distribute‚ transmit‚ and adapt the work in any medium‚ so long as the original work is properly

    Premium Facial recognition system Automatic identification and data capture Speech recognition

    • 33246 Words
    • 133 Pages
    Powerful Essays
  • Powerful Essays

    “DESIGN EXCHANGE OF THE SINGLE CHIP MULTI-COMPUTER NETWORKS” Abstract Submitted in Partial fulfillment of the requirement for the degree of DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE by Chandra Shekhar Enrollment No:- ____________ Under the Supervision of Dr. Mohammad Hussain Professor‚ AIET‚ Lucknow COMPUTER SCIENCE Sai Nath University Ranchi‚ Jharkhand Year of Submission: ______ Introduction A recent trend in high performance computing (HPC) has been towards the use of

    Premium Computer network OSI model Router

    • 5296 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    1. INTRODUCTION In order to protect users of computer systems and to secure network-based transactions‚ demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics‚ i.e.‚ a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems

    Premium Fingerprint Biometrics

    • 4430 Words
    • 18 Pages
    Powerful Essays
Page 1 34 35 36 37 38 39 40 41 50