نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

2012
Alexander Maier Tim Tack Oliver Niggemann

This paper presents a novel method for visual anomaly detection in production plants. Since the complexity of the plants and the number of signals that have to be monitored by the operator grows, there is a need of tools to overcome the information overflow. The human is highly able to recognize irregularities in figures. More than 80% of the perceived information is captured visually. The appr...

2012
Stefania Zappettini Massimo Grilli Guendalina Olivero Elisa Mura Stefania Preda Stefano Govoni Alessia Salamone Mario Marchi

Using both in vitro (hippocampal synaptosomes in superfusion) and in vivo (microdialysis) approaches we investigated whether and to what extent β amyloid peptide 1-40 (Aβ 1-40) interferes with the cholinergic modulation of the release of glycine (GLY) in the rat hippocampus. The nicotine-evoked overflow of endogenous GLY in hippocampal synaptosomes in superfusion was significantly inhibited by ...

Journal: :Sustainable Energy, Grids and Networks 2021

Recent cyberattacks on the U.S. power grid revealed how vulnerable smart grids are against cyberattacks. Consequently, it is critical to study that can lead cascading failures in systems and develop models realistically emulate attack scenarios bypass existing bad data detection algorithms. In this paper, a mixed-integer linear programming model developed accurately load redistribution attacks ...

1999
Michel Mandjes Sem Borst

We consider a fluid queue fed by a superposition of n homogeneous on-off sources with generally distributed onand off-periods. We scale buffer space B and link rate C by n, such that we get nb and nc, respectively. Then we let n grow large. In this regime, the overflow probability decays exponentially in the number of sources n; we specifically examine the situation in which also b is large. We...

Journal: :Circulation 2005
Satoshi Yamamoto Noriko Matsumoto Mitsuo Kanazawa Marie Fujita Masanori Takaoka Cheryl E Gariepy Masashi Yanagisawa Yasuo Matsumura

BACKGROUND Endothelin (ET)-1 and norepinephrine (NE) are involved in myocardial ischemia/reperfusion injury. We investigated the role of ET-1 in ischemia/reperfusion-induced NE overflow and cardiac dysfunction using a selective ET(A) receptor antagonist (ABT-627), a selective ET(B) receptor antagonist (A-192621), and the spotting lethal (sl) rat, which carries a naturally occurring deletion in ...

2009
Chenxin Li Jose H. Blanchet

Events such as loss packets in queuing systems and bankruptcy probabilities for insurance companies are rare but consequential. The likelihood of such events can often be linked to the maximum of a stochastic process. We refer to such quantities as overflow probabilities—due to their connection to queues. Current Monte Carlo algorithms for efficient evaluation of overflow probabilities often as...

H. R. Sheibani and H. Bayyat,

A physical model of gabion overflow dams was studied to determine the velocity profile and Reynolds shear stress. Physical tests were done under two different conditions of dam crest, overflow dams with impermeable and with permeable crests. Instantaneous velocity components over dam crest were measured by an ADV (Acoustic Doppler Velocimeter) instrument. This instrument is capable of measuring...

2003
Zili Shao Qingfeng Zhuge Yi He Edwin Hsing-Mean Sha

Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded systems against buffer overflow attacks. In this paper, we propose the Hardware/Software Address Protection (HSAP) technique to solve this problem. We first classify buffer overflow attacks into two categories (stack s...

2014
Richard Brown

Theories of consciousness can be separated into those that see it as cognitive in nature, or as an aspect of cognitive functioning, and those that see consciousness as importantly distinct from any kind of cognitive functioning. One version of the former kind of theory is the higherorder-thought theory of consciousness. This family of theories posits a fundamental role for cognitive states, hig...

2012
Cheng-Yuan Ho Ying-Dar Lin

False Positives (FPs) and False Negatives (FNs) happen to every Intrusion Detection/Prevention System (IDS/IPS). This work proposes a mechanism of False Positive/Negative Assessment (FPNA) with multiple IDSs/IPSs to collect FP and FN cases from real-world traffic. Over a period of sixteen months, more than two thousand FPs and FNs have been collected and analyzed. From the statistical analysis ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید