نتایج جستجو برای: ids assessment

تعداد نتایج: 566100  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1990
P J Wilson C P Morris D S Anson T Occhiodoro J Bielicki P R Clements J J Hopwood

Iduronate 2-sulfatase (IDS, EC 3.1.6.13) is required for the lysosomal degradation of heparan sulfate and dermatan sulfate. Mutations causing IDS deficiency in humans result in the lysosomal storage of these glycosaminoglycans and Hunter syndrome, an X chromosome-linked disease. We have isolated and sequenced a 2.3-kilobase cDNA clone coding for the entire sequence of human IDS. Analysis of the...

2013
Alison V. Towner Michelle A. Wcisel Ryan R. Reisinger David Edwards Oliver J. D. Jewell

South Africa is reputed to host the world's largest remaining population of white sharks, yet no studies have accurately determined a population estimate based on mark-recapture of live individuals. We used dorsal fin photographs (fin IDs) to identify white sharks in Gansbaai, South Africa, from January 2007-December 2011. We used the computer programme DARWIN to catalogue and match fin IDs of ...

2015
Vidhya N. Gavali Sunil Sangve

the Intrusion Detection System (IDS) is tool which detects an unauthorised, misuse of computer system and provides information security. An intrusion detection system (IDS) is combined with hardware and software elements that work together to find unexpected events which may indicate an attack will happen, is happening, or has happened. Network intrusion detection based on anomaly detection pro...

2012
Joffre Gavinho Filho Luiz F. R. C. Carmo Raphael Machado Luci Pirmez

An Intrusion Detection System (IDS) for Cognitive Radio Network (CRN) is proposed. The considered IDS is constructed by combining two classic mechanisms for CRN intrusion detection, namely the Localization mechanism and the Reputation mechanism. The composition of the mechanisms is done with the aid of a Genetic Algorithm (GA) responsible for calibrating the IDS, that is, for attributing “weigh...

Journal: :NeuroImage 2011
Yoshi-Taka Matsuda Kenichi Ueno R. Allen Waggoner Donna Erickson Yoko Shimura Keiji Tanaka Kang Cheng Reiko Mazuka

Adults typically address infants in a special speech mode called infant-directed speech (IDS). IDS is characterized by a special prosody (i.e., higher pitched, slower and hyperarticulated) and a special lexicon ("baby talk"). Here we investigated which areas of the adult brain are involved in processing IDS, which aspects of IDS (prosodic or lexical) are processed, to what extent the experience...

1992
Ming-Chin Lu

Image Defocus Simulator (IDS) is an interactive research software tool developed to simulate the image sensing/formation process in a typical CCD camera system. IDS takes as input the camera parameters and the scene parameters. It produces as output a digital image of the scene as sensed by the camera. IDS consists of a number of distinct modules each implementing one step in the computational ...

1996
Steve Jones Stephen Lundy Gordon W. Paynter Gordon W Paynter

This paper describes the Interactive Document Summariser (IDS), a dynamic document summarisation system, which can help users of digital libraries to access on-line documents more effectively. IDS provides dynamic control over summary characteristics, such as length and topic focus, so that changes made by the user are instantly reflected in an on-screen summary. A range of ‘summary-in-context’...

2012
Jeesun Kim Chris Davis Christine Kitamura

We investigated how the properties of Infant Directed Speech (IDS) and Adult Directed Speech (ADS) differed in acoustics and in speech-related articulation. Both the degree to which auditory and motion properties changed as a function of speech style (IDS vs. ADS) as well as how the correlation between properties was affected by this change were examined. The acoustic properties of 13 sentences...

2013
R. Sridevi

Intrusion-detection systems (IDS) which were essential in computer security because of difficulties in ensuring the information systems are security free. Literature has numerous intrusion detection approaches for network security. IDS efficiency was based on the ability to differentiate between normal and harmful activity. Hence, it becomes crucial to achieve better detection rates and lower f...

2015

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید