This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study ...
Decentralized peer to peer (p2p) networks like Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network ...
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
Typical applications of evolutionary optimization in static environments involve the approximation of the extrema of functions. For dynamic environments, the interest is not to lo...
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...