نتایج جستجو برای: ids

تعداد نتایج: 5339  

Journal: :Anesthesia and analgesia 2008
Hélène Gonzalez Vincent Minville Khedija Delanoue Michel Mazerolles Dominique Concina Olivier Fourcade

BACKGROUND Using the intubation difficulty scale (IDS), we sought to confirm that obese patients are more difficult to intubate than lean patients. We assessed classical bedside tests and included neck circumference. METHODS We prospectively compared the incidence of difficult tracheal intubation in 70 obese [body mass index (BMI) > or = 30 kg/m(2)] and 61 lean patients (BMI < 30 kg/m(2)). Th...

2017
Retha Arjadi Maaike H. Nauta Dharmayati B. Utoyo Claudi L. H. Bockting

BACKGROUND Depression screening and examination in Indonesia are highly challenging due to the disproportionately low number of mental health professionals in comparison to the Indonesian population. Self-report questionnaires on depression are cost-effective and time-efficient. The current study investigates the psychometric properties of the Indonesian Inventory of Depressive Symptomatology S...

Journal: :Journal of speech, language, and hearing research : JSLHR 2013
Susie Robertson Deborah von Hapsburg Jessica S Hay

PURPOSE Infant-directed speech (IDS) facilitates language learning in infants with normal hearing, compared to adult-directed speech (ADS). It is well established that infants with normal hearing prefer to listen to IDS over ADS. The purpose of this study was to determine whether infants with hearing impairment (HI), like their NH peers, show a listening preference for IDS over ADS. METHOD A ...

Journal: :Computers & Electrical Engineering 2009
M. Ali Aydin A. Halim Zaim K. Gökhan Ceylan

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known a...

2012
Anna J. Esbensen Sigan L. Hartley

It is well established that individuals with intellectual disabilities (IDs) suffer from mood disorders. Individuals with IDs present with a similar set of depressive behaviors, including dysfunctional cognitive deficits similar to individuals without IDs such as having a low self-concept, attending to negative features of an event, and making negative causal attributions for stressful events (...

2001
Samuel Patton William Yurcik David Doss

We report a vulnerability to network signature-based IDS which we have tested using Snort and we call “Squealing”. This vulnerability has significant implications since it can easily be generalized to any IDS. The vulnerability of signature-based IDS to high false positive rates has been welldocumented but we go further to show (at a high level) how packets can be crafted to match attack signat...

2015
Shahin Ara Begum

An intrusion detection system (IDS) is used to manage network traffic and monitors for suspicious activity and alerts the system or network administrator. One of the major properties of IDS is to respond for anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS can identify threats in various ways: 1) it detects specific s...

2012
Amin Hassanzadeh Zhaoyan Xu Radu Stoleru Guofei Gu

As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing and memory). Cooperativ...

2005
Frédéric Massicotte Mathieu Couture Yvan Labiche

Intrusion Detection Systems (IDS) use different techniques to reduce the number of false positives they generate. Simple network context information such as the communication session state has been added in IDS signatures to only raise alarms in the proper context. However, this is often not sufficient and more network context information needs to be added to these Stateful IDS (SIDS) signature...

2014
Amit kumar Sahu Chinmay Bhatt Shrikant Lade

Countless have been proposed on intrusion detection system, which prompts the execution of executor based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS and so on. While building such IDS models, taking in calculations from stream of system movement assume essential part in precision of IDS frameworks. The proposed work concentrates on actualizing the novel strategy t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید