نتایج جستجو برای: virtual detection method
تعداد نتایج: 2196639 فیلتر نتایج به سال:
abstract nowadays, industries cannot play a crucial role in national and international competitions. the tourism industry is no exception. tourism industry development as the most important economic sector and income generation is one of the key challenges of economic development in the world. therefore, countries were successful that take advantage of the capabilities of tourism sector using ...
automatic road extraction from aerial images can be very helpful in traffic control and vehicle guidance systems. most of the road detection approaches are based on image segmentation algorithms. color-based segmentation is very sensitive to light changes and consequently the change of weather condition affects the recognition rate of road detection systems. in order to reduce the light change ...
Designing and debugging distributed systems requires the detection of conditions across the entire system. As an illustration, monitoring the status of an application requires detection of termination, and using virtual time requires the periodic calculation of the global virtual time. The Generalized Conjunctive Predicate (GCP) detector ooers a method to derive detection algorithms for these a...
For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems from being misused. Unfortunately, MAC is still not widely deployed because of its complexity. The problem is even worse in a virtual machine environment, because the current architecture is not designed to support MAC in a site-wide manner: machines with multiple vir...
background and purpose: emergency physicians play an important role in the immediate diagnosis of bioterrorism activities. the present study was conducted with the purpose of comparing the effectiveness of virtual learning and classroom learning in approach to bioterrorism and chemical terrorism for emergency physician s. methods: this was a semi-empirical study, which was conducted via testing...
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which...
We present a simple method for performing real-time collision detection in a virtual surgery environment. The method relies on the graphics hardware for testing the interpenetration between a virtual deformable organ and a rigid tool controlled by the user. The method enables to take into account the motion of the tool between two consecutive time steps. For our specific application, the new me...
Current anti-virus malware detection methods focus on signature-based methods. Recent research has introduced new, effective methods of malware detection. First, recent research including cloud-based monitoring and analysis, joint network-host based methods, feature ranking, machine learning and kernel data structure invariant monitoring are reviewed. Second, virtual machine based malware detec...
Cefixime is essential member of orally energetic third generation cephalosporin and has tremendous activity aligned with many pathogens. The virtual bioavailability of a newly industrial dispersible tablet as compared with a recognized identified formulation. A simple and available reversed-phase HPLC method with UV detection has been urbanized and validate for cefixime evaluate in human p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید