نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

Journal: :Circulation research 1991
X J Du A M Dart R A Riemersma M F Oliver

Using a perfused innervated rat heart model, we studied the sex difference in the sympathetic nerve stimulation-induced norepinephrine release and its presynaptic alpha 2-adrenergic inhibition in normoxic and ischemic conditions. During normoxic perfusion, the alpha 2-adrenoceptor antagonist rauwolscine resulted in a higher overflow of norepinephrine during nerve stimulation in females than in ...

Journal: :Bioprocess and biosystems engineering 2013
Robert Gustavsson Carl-Fredrik Mandenius

A soft sensor approach is described for controlling metabolic overflow from mixed-acid fermentation and glucose overflow metabolism in a fed-batch cultivation for production of recombinant green fluorescence protein (GFP) in Escherichia coli. The hardware part of the sensor consisted of a near-infrared in situ probe that monitored the E. coli biomass and an HPLC analyzer equipped with a filtrat...

Journal: :IEEE Trans. Information Theory 2001
Ioannis Ch. Paschalidis Spyridon Vassilaras

We propose estimators of the buffer overflow probability in queues fed by a Markov-modulated input process and serviced by an autocorrelated service process. These estimators are based on large-deviations asymptotics for the overflow probability. We demonstrate that the proposed estimators are less likely to underestimate the overflow probability than the estimator obtained by certainty equival...

2015
Isao Sasano

Buffer overflow is a serious problem when the software is run as a server on the internet. Especially when the return addresses are overwritten intentionally, the control flow may be changed as the attacker intends. Although there have been proposed several ways to protect attacks that utilize the buffer overflow, the number of the errors owing to the buffer overflow have been increasing gradua...

2009
Tzu-Rung Lee Kwo-Cheng Chiu Da-Wei Chang

Buffer overflow has become a major source of network security vulnerability. Traditional schemes for detecting buffer overflow attacks usually terminate the attacked service, degrading the service availability. In this paper, we propose a lightweight buffer overflow protection mechanism that allows continued network service. The proposed mechanism allows a service program to reconfigure itself ...

2016
Adnan Affandi Mubashshir Husain Saad Mohammed Almajnooni

When CCD image sensor is exposed to very intense light , an excess charge is generated in photodiode. This excess charge may leak into neighboring cells. This phenomenon is called Blooming. To stop blooming phenomenon an Overflow Drain structure is adapted to suppress this excess charge. In this paper CCD Image sensor with a Vertical Overflow Drain (VOD) structure is investigated in one and two...

2017
Roy Ka-Wei Lee David Lo

Increasingly, software developers are using a wide array of social collaborative platforms for software development and learning. In this work, we examined the similarities in developer’s interests within and across GitHub and Stack Overflow. Our study finds that developers share common interests in GitHub and Stack Overflow; on average, 39% of the GitHub repositories and Stack Overflow questio...

2007
Manami KIKUCHI Takayuki ITOH Hiroki TAKAKURA

Research and development of IDS (intrusion Detection System) is a hot topic for the purpose of security maintenance of computer network. We have already presented a technique for visualizing logs of IDS. However, the present IDS products detect only known suspicious accesses, and therefore we need an extended visualization technique if we would like to visualize the statistics of malicious acce...

Journal: :آب و توسعه پایدار 0
علی دهنوی ناصر عادل پور سید محمدسعید موسوی سوداگر

this study investigates the amount of suspended solid particles in three drinking water wells, conducted several times per day in the city of mashhad. the results have also been used for the review and optimization of tested hydro-cyclones. for this purpose, 18 different hydro-cyclones, based on the experimental design process of the taguchi method, were designed and the affecting factors were ...

Journal: :I. J. Network Security 2014
Chi-Hsien Lin K. Bharanitharan Chin-Chen Chang

Information hiding is an emerging research area which includes applications such as copyright management [4], tamper detection and content authentication. Existing chaos optimization and random position selection based watermarking embedding methods make claims for robustness and reversibility; however, reversibility becomes questionable when data capacity is high. In a published paper, authors...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید