نتایج جستجو برای: based detection

تعداد نتایج: 3322688  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - پژوهشکده برق و کامپیوتر 1391

امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...

2015
Megha Gupta K. Q. Yan S. C. Wang S. S. Wang Z. Muda W. Yassin M. N. Suleiman N. I. Udzir Vipul P. Hattiwale

In current scenario most of the intrusion detection systems (IDS) use one of the two detection methods, misused detection or Anomaly detection?both of them have their own limitations. Technology has developed the technique that combines misuse detection system with anomaly detection system (ADS) or network intrusion detection system and host-based intrusion detection system is known as hybrid i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this thesis protic and aprotic ammonium-based ionic liquids were synthesized and their surface tensions were measured in the range of 298-373k. the protics are alkyl ammonium-based ils with the carboxylate (formate, acetate, propionate) anion and aprotics are quaternary ammonium-based ils with bis(trifluoromethylsulfonyl)imide anion. capillary rise method was used for surface tension measure...

K-complex is an underlying pattern in the sleep EEG. Due to the role of sleep studies inneurophysiologic and cognitive disorders diagnosis, reliable methods for analysis and detection of this patternare of great importance. In our previous work, Synchrosqueezing Transform (SST) was proposed for analysisof this pattern. SST is an EMD-like tool, which benefits from wavelet transform and reallocat...

Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...

A. Abadpour, S. Kasaei,

A robust skin detector is the primary need of many fields of computer vision, including face detection, gesture recognition, and pornography filtering. Less than 10 years ago, the first paper on automatic pornography filtering was published. Since then, different researchers claim different color spaces to be the best choice for skin detection in pornography filtering. Unfortunately, no com...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده شیمی 1392

in the present work, a simple and sensitive method was developed for determination of morphine and heroin using gold nanoparticles as resonance rayleigh scattering (rrs) and colorimetric technique’s probe. synthesized gold nanoparticles by sodium citrate reduction method have a negative charge layer on their surfaces because of self-assembled citrate anions on their surface. binding of morphin...

Abbas Ghaemi Bafghi Amin Rasoulifard

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

Journal: :رادار 0
امیر زعیم باشی عباس شیخی مصطفی درختیان

this paper addresses the signal processing principles in passive bistatic radar (pbr) systems. in this case, the detection problem in the presence of system noise, clutter/multipath, direct signal and interfering target signals is investigated. to this light, two types of detectors are studied. in the first one, which is based on intuitive sense, we examine two detectors. in the second type det...

2001
David A. Wagner Drew Dean

One of the primary challenges in intrusion detection is modelling typical application behavior, so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatically derive a model of application behavior. The result is a host-based intrusion detection system with three advantages: a high degree of automation, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید