نتایج جستجو برای: drug misuses
تعداد نتایج: 590094 فیلتر نتایج به سال:
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. To control these threats, recognition of attacks is critical matter. Probing, Denial of Service (DoS), Remote to User (R2L) Attac...
Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, an NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour and detecting those that do not fit on that model). Still, since their problem knowledge is ...
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS consist of semantic IDS and Fuzzy based IDS. Rule based IDS looks for the specific pattern which is defined as malicious. A non-intrusive regular pattern can be malicious if it occurs several times with a short time in...
Today’s processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (OS) support for and utilization of the hardware counter statistics has been limited and ad hoc. In this paper, we make the case for direct OS management of hardware counter statistics. First, we show the utility of processo...
Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuses, prompts ethical questions, and engenders grave concerns from both users and non-users. Despite considerable discussion of the privacy problems uncovered in prior work, questions remain as to how to design a privacypreserving video media space and how to evaluate its effect on p...
Nominal memoization combines memoized functional programming with a controlled form of imperative cache effects. By leveraging these imperative effects, nominal memoization can dramatically outperform traditional (“structural”) memoization. However, the nominal memoization programming model is error-prone: when the programmer unintentionally misuses names, their incremental program ceases to co...
Finite mixture models, which are a type of latent variable model, express the overall distribution of one or more variables as a mixture of a finite number of component distributions. In direct applications, one assumes that the overall population heterogeneity with respect to a set of manifest variables results from the existence of two or more distinct homogeneous subgroups, or latent classes...
It can be surprising to naive observers that statistics from different research studies concerning the same issue can produce very dissimilar or contradictory results. In order to resolve this paradox, many people conclude that statistics are not actually reliable indicators of reality. Those versed in statistics, however, understand that statistics rely on assumptions. Proceeding from differen...
Classical conditioning is at the heart of most learning phenomena. It is thus essential that we develop accurate models of conditioning; since, psychological models rely heavily in verbal accounts that are necessarily imprecise it has become apparent that the development of computational models is imperious. However, we need to separate the wheat from the chaff. In this paper we review the main...
The application of artificial neural networks (ANNs) for prognostic and diagnostic classification in clinical medicine has become very popular. In particular, feed-forward neural networks have been used extensively, often accompanied by exaggerated statements of their potential. In this paper, the essentials of feed-forward neural networks and their statistical counterparts (that is, logistic r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید