intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Operational detection

Xem 1-20 trên 24 kết quả Operational detection
  • In this article, the research team proposes a costeffective IoT-based approach, integrating data like SCADA, to enhance management and monitoring convenience. The research outcome aims to design an electrical cabinet that includes various mechanisms to detect, and safeguard loads from potential incidents, while also being capable of collecting operational data, recording incident occurrences, and integrating with the central management system at the construction site.

    pdf7p viyoko 01-10-2024 1 1   Download

  • Breast cancer screening is currently predominantly based on mammography, tainted with the occurrence of both false positivity and false negativity, urging for innovative strategies, as effective detection of early-stage breast cancer bears the potential to reduce mortality.

    pdf9p vielonmusk 21-01-2022 37 1   Download

  • This paper proposes a servo controller design and fault detection algorithm for speed control of conveyor system (CS). Firstly, modeling for a CS is described. Secondly, the robust servo controller based on polynomial differential operator is applied to track the trapezoidal velocity profile reference input. Thirdly, a fault detection algorithm based on Extended Kalman Filter (EKF) is proposed.

    pdf5p sotritu 18-09-2021 30 2   Download

  • In this thesis, we introduce the potential ship detection and management method, which to the best of our knowledge, is the first one made for Vietnamese coastal region using high resolution pan images from VNREDSat-1.

    pdf27p tamynhan0 04-07-2020 19 3   Download

  • In this thesis, we introduce the potential ship detection and management method, which to the best of our knowledge, is the first one made for Vietnamese coastal region using high resolution pan images from VNREDSat-1.

    pdf57p tamynhan0 04-07-2020 24 2   Download

  • With Europe’s ageing fleet of nuclear reactors operating closer to their safety limits, the monitoring of such reactors through complex models has become of great interest to maintain a high level of availability and safety.

    pdf9p christabelhuynh 29-05-2020 10 1   Download

  • The goal of the simulation strategies is to model complex multi-physics and multi-scale phenomena specific to nuclear reactors. The use of machine learning combined with such advanced simulation tools is also demonstrated to be capable of providing useful information for the detection of anomalies during operation.

    pdf14p christabelhuynh 29-05-2020 7 3   Download

  • In this chapter, the following content will be discussed: System model, deadlock characterization, methods for handling deadlocks, deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock.

    ppt45p dien_vi02 07-10-2018 36 0   Download

  • Lecture Digital image processing: Edge detection presents the following content: Introduction, the sobel operator, the prewitt operator, the canny operator, the zero-crossing detector, the unsharp filter.

    pdf14p youcanletgo_04 17-01-2016 53 3   Download

  • Lecture Operating System: Chapter 03 - Deadlocks presented Resource, introduction to deadlocks, the ostrich algorithm, deadlock detection and recovery, deadlock avoidance, deadlock prevention, other issues.

    ppt29p talata_1 22-09-2014 85 7   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing

    ppt55p muathu_102 28-01-2013 66 4   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing Evading detection Bouncing

    ppt76p muathu_102 28-01-2013 59 4   Download

  • IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan promising ports for openness (80, 21, …) Service Evaluation determine the OS Target Selection pick the most vulnerable host, most running services... Vulnerability Probes Automated password attacks FTP, HTTP, NetBIOS, VNC PCAnywhere…. Application specific attacks try known vulnerabilities on present services

    ppt9p muathu_102 28-01-2013 69 3   Download

  • Used to communicate IP status and error messages between hosts and routers Uses IP to route its messages between hosts Must be implemented with IP remember, IP is just a packet delivery system transmits and routes datagrams from sources to destinations through a series of interconnected networks it has a checksum in the IP header to detect lost bits no error detection on the datagram payload though but has no native mechanism for source host notification This is where ICMP comes in its used to report IP errors to the source host ICMP data is carried as the payload of an IP datagram specifie...

    ppt19p muathu_102 28-01-2013 51 3   Download

  • Event Ordering Mutual Exclusion Atomicity Concurrency Control Deadlock Handling Election Algorithms Reaching Agreement To describe various methods for achieving mutual exclusion in a distributed system To explain how atomic transactions can be implemented in a distributed system To show how some of the concurrency-control schemes discussed in Chapter 6 can be modified for use in a distributed environment To present schemes for handling deadlock prevention, deadlock avoidance, and deadlock detection in a distributed system...

    pdf54p perpan 02-09-2012 64 11   Download

  • Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Silberschatz, Galvin and Gagne ©2005 .Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number of different methods for preventing or avoiding deadlocks in a computer system.

    pdf44p perpan 02-09-2012 69 9   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Flat Zone Analysis and a Sharpening Operation for Gradual Transition Detection on Video Images

    pdf11p sting12 11-03-2012 35 4   Download

  • Erratic eating is one of the manifestations of mental disorders. Patients can not eat or drink, or eating too much can not be controlled.For mental health care possible, it is important to reserve the disease, early detection and treatment of disorders to prevent complications, and rehabilitation for patients with community reintegration. However, psychiatric symptoms were relatively discreet, sometimes hard to distinguish from the normal operation

    pdf10p thulanh29 17-12-2011 55 2   Download

  • 4. SEGMENTATION AND EDGE DETECTION 4.1 Region Operations Discovering regions can be a very simple exercise, as illustrated in 4.1.1. However, more often than not, regions are required that cover a substantial area of the scene rather than a small

    doc14p 0914811815 23-04-2011 97 9   Download

  • khái quát lỗi Secure Network Operations, Inc. http://www.secnetops.com/research Strategic Reconnaissance Team research secnetops com Team Lead Contact kf secnetops com. Our Mission: Operations offers expertise in Networking, Intrusion Detection Systems (IDS), Software Security Validation, and Corporate/Private Network Security. Our mission is to facilitate a secure and reliable Internet and inter-enterprise communications infrastructure through the products and services we offer.

    pdf5p tt1991tt 20-02-2011 135 21   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2