نتایج جستجو برای: signature
تعداد نتایج: 65887 فیلتر نتایج به سال:
in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
background classification of cancer subtypes by means of microarray signatures is becoming increasingly difficult to ignore as a potential to transform pathological diagnosis nonetheless, measurement of indicator genes in routine practice appears to be arduous. in a preceding published study, we utilized real-time pcr measurement of indicator genes in acute lymphoid leukaemia (all) and acute my...
nowadays, technological development and the appearance of new informational and communicational devices have been lead to new methods for communication and generating and storing of data. the growth of using of these methods in commercial and daily connection has caused a new version of evidence called electronic evidence. although the nature of electronic and paper evidence are different, the ...
In this research we study the Mono-Z signature along with dark matter production at the LHC in a renormalizable dark matter model. We look at processes with L+L-+MET in the final state. We simulate signal and background events at central mass energy 14 TeV We then evaluate the LHC sensitivities for some points in the model parameter space for two integrated luminosities L=100 fb-1 and L=1 ab-1 ...
we give further results for perron-frobenius theory on the numericalrange of real matrices and some other results generalized from nonnegative matricesto real matrices. we indicate two techniques for establishing the main theorem ofperron and frobenius on the numerical range. in the rst method, we use acorresponding version of wielandt's lemma. the second technique involves graphtheory.
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastructure where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable/escrow cryptography. The basic dilemma is that on the one...
In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...
The signature file method is a popular indexing technique used in information retrieval and databases. It excels in efficient index maintenance and lower space overhead. However, it suffers from inefficiency in query processing due to the fact that for each query processed the entire signature file needs to be scanned. In this paper, we introduce a tree structure, called a signature tree, estab...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید