• Aucun résultat trouvé

Detection system

A lightweight threat detection system for industrial wireless sensor networks

A lightweight threat detection system for industrial wireless sensor networks

... threat detection system arises from the need to protect WSNs against ...the system behavior and interactions between nodes to detect threat attempts and/or ...

13

Self-adaptive web intrusion detection system

Self-adaptive web intrusion detection system

... intrusion detection system which relies on a set of local model-based ...This system is applied to the intrusion detection from a stream of HTTP ...our system 1) detects intrusion ...

28

Low power architecture for fall detection system

Low power architecture for fall detection system

... Fall Detection System and our system also give an urgent alarm for detecting different kinds of ...Fall Detection System, a DUT-HBU database which is classified with different actions: ...

177

LeakFinder - new pipeline leak detection system

LeakFinder - new pipeline leak detection system

... developed system for locating leaks in water distribution networks. The system is based on the cross-correlation method and is realized in software for personal computers ...new system is readily ...

8

Design and Implementation of a Centralized Disturbance Detection System for Smart Microgrids

Design and Implementation of a Centralized Disturbance Detection System for Smart Microgrids

... a system is close to a critical transition, collapse, or tipping ...power system signals ...power system signals that are used as metrics of this approach are then ...The detection ...

89

A real-time and robust intrusion detection system with commodity wi-fi

A real-time and robust intrusion detection system with commodity wi-fi

... Aiming to overcome the limitations mentioned above of previous approaches, in this work, we propose a CSI Doppler effect based human intrusion detection system, called RR- Alarm. By understanding indoor ...

5

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... Intrusion Detection Systems (IDS) are quickly becoming a popular requirement in building a network se- curity ...Intrusion Detection System; Multi-agents; Clustering; On- ...

13

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... 2 Abstract Wireless sensor networks (WSNs) have become an optimal solution in many fields for their efficiency. Due to their vulnerability, they are usually targeted by many attacks aiming to harm their ...

73

In-pile qualification of the fast-neutron-detection-system

In-pile qualification of the fast-neutron-detection-system

... A significant part of this effort have been conducted in the framework of the Joint Instrumentation Laboratory between the CEA and the Belgian Nuclear Research Centre (SCK•CEN). In order to improve measurement techniques ...

6

2015 — Anomaly detection system using system calls for android smartphone system

2015 — Anomaly detection system using system calls for android smartphone system

... extract system features used in the process of detecting anomaly ...smartphone system, collects the data describing the system state, such as the amount of free RAM, the number of running processes, ...

164

SOUKHRIA: Towards an Irony Detection System for Arabic in Social Media

SOUKHRIA: Towards an Irony Detection System for Arabic in Social Media

... Irony detection is quite a hot topic in the research community also due to its importance for efficient sentiment analysis [13, 19, 24].Indeed, although current systems achieve relatively good results on objective ...

9

Vulnerability of Doppler detection system to countermeasures Report no. 1

Vulnerability of Doppler detection system to countermeasures Report no. 1

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. NRC Publicat[r] ...

25

A Dataflow Object Detection System for FPGA-based Smart Camera

A Dataflow Object Detection System for FPGA-based Smart Camera

... In this context, there has been recently a regained attention on approaches relying on domain specific languages, such as Caltrop Actor language (CAL) [5]. The idea is that the aforementioned gap can be reduced by ...

19

A remote ice detection system suitable for marine and aerospace applications

A remote ice detection system suitable for marine and aerospace applications

... present system, which has clear and foggy layer capability, was used to measure thicknesses of accumulations of foggy freshwater ice layers on a metallic ...

13

Using textural and geometric information for an automatic bridge detection system

Using textural and geometric information for an automatic bridge detection system

... Evaluation is performed on a set of small (  pixels), pan-chromatic, high-resolution satellite images (SPOT 5 images at 2.5m per pixel). We have 100 images containing one or more bridges, and 100 images ...

7

Sub-ppb mercury detection in real environmental samples with an improved Rhodamine-based detection system

Sub-ppb mercury detection in real environmental samples with an improved Rhodamine-based detection system

... Rhodamine based fluorescent sensor was synthesized and the experimental conditions were.. 15.[r] ...

24

SOUKHRIA: Towards an irony detection system for arabic in social media

SOUKHRIA: Towards an irony detection system for arabic in social media

... For the first time, this paper proposed an approach to irony detection in a corpus of Arabic tweets. Our approach is supervised and rely on a group of four features, that have been used for detecting irony in ...

9

An intrusion detection system on network security for web application

An intrusion detection system on network security for web application

... As the illustration in Figure 3-1 , Analysis Engine retrieves configuration and profile information from database for intrusion analysis, and Response Module saves ma[r] ...

100

Epigenetic algorithm for performing intrusion detection system

Epigenetic algorithm for performing intrusion detection system

... [11] Corolineberry, A.C.; Berry, R.J.: Epigenetic variation in the human cranium. J. Anat. 101, 361–379 (1967) [12] S. Selvakani and R.S. Rajesh, “Genetic Algorithm for Framing Rules for Intrusion Detection” ...

6

Investigation of a surface wave intruder detection system

Investigation of a surface wave intruder detection system

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. NRC Publicat[r] ...

12

Show all 8636 documents...

Sujets connexes