نتایج جستجو برای: signature

تعداد نتایج: 65887  

Journal: :نشریه دانشکده فنی 0
مهدی آبادی سعید جلیلی

in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Journal: :iranian journal of pediatric hematology and oncology 0
e sakhinia connective tissue disease research center, department of medical genetics, tabriz university of medical sciences, tabriz ma estiar department of medical genetics, school of medicine, tehran university of medical sciences, tehranسازمان اصلی تایید شده: دانشگاه علوم پزشکی تبریز (tabriz university of medical sciences) s andalib neurosciences research center, imam reza hospital, tabriz university of medical sciences, tabriz, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی تهران (tehran university of medical sciences) a rezamand department of pediatrics, children hospital, tabriz university of medical sciences, tabriz, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی تبریز (tabriz university of medical sciences)

background classification of cancer subtypes by means of microarray signatures is becoming increasingly difficult to ignore as a potential to transform pathological diagnosis nonetheless, measurement of indicator genes in routine practice appears to be arduous. in a preceding published study, we utilized real-time pcr measurement of indicator genes in acute lymphoid leukaemia (all) and acute my...

Journal: :مطالعات حقوق خصوصی 0
مرتضی شهبازی نیا دانشکده علوم انسانی دانشگاه تربیت مدرس محبوبه عبدالهی دانشگاه آزاد اسلامی، واحد دزفول

nowadays, technological development and the appearance of new informational and communicational devices have been lead to new methods for communication and generating and storing of data. the growth of using of these methods in commercial and daily connection has caused a new version of evidence called electronic evidence. although the nature of electronic and paper evidence are different, the ...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

In this research we study the Mono-Z signature along with dark matter production at the LHC in a renormalizable dark matter model. We look at processes with L+L-+MET in the final state. We simulate signal and background events at central mass energy 14 TeV We then evaluate the LHC sensitivities for some points in the model parameter space for two integrated luminosities L=100 fb-1 and L=1 ab-1 ...

Journal: :journal of mahani mathematical research center 0
mostafa zangiabadi department of mathematics, hormozgan university, p. o. box 3995, bandar abbas, iran hamid reza afshin department of mathematics, vali-e-asr university of rafsanjan, p. o. box 518, rafsanjan, iran

we give further results for perron-frobenius theory on the numericalrange of real matrices and some other results generalized from nonnegative matricesto real matrices. we indicate two techniques for establishing the main theorem ofperron and frobenius on the numerical range. in the rst method, we use acorresponding version of wielandt's lemma. the second technique involves graphtheory.

2000
Adam L. Young Moti Yung

We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastructure where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable/escrow cryptography. The basic dilemma is that on the one...

In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...

Journal: :Inf. Process. Lett. 2002
Yangjun Chen

The signature file method is a popular indexing technique used in information retrieval and databases. It excels in efficient index maintenance and lower space overhead. However, it suffers from inefficiency in query processing due to the fact that for each query processed the entire signature file needs to be scanned. In this paper, we introduce a tree structure, called a signature tree, estab...

Journal: :International Journal of Applied Information Systems 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید