Operational detection
-
Lecture Operating System: Chapter 03 - Deadlocks presented Resource, introduction to deadlocks, the ostrich algorithm, deadlock detection and recovery, deadlock avoidance, deadlock prevention, other issues.
29p talata_1 22-09-2014 87 7 Download
-
Computing matrices is a crucial and prevalent topic in the field of data processing and artificial intelligence. One of the significant and effective methods for matrix manipulation is Singular Value Decomposition (SVD). Based on matrix computations using SVD, we can perform various complex operations such as dimensionality reduction, hidden information detection, optimization, and many other applications.
9p viprimi 16-12-2024 2 0 Download
-
In this chapter, the following content will be discussed: System model, deadlock characterization, methods for handling deadlocks, deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock.
45p dien_vi02 07-10-2018 36 0 Download
-
In this thesis, we introduce the potential ship detection and management method, which to the best of our knowledge, is the first one made for Vietnamese coastal region using high resolution pan images from VNREDSat-1.
57p tamynhan0 04-07-2020 25 3 Download
-
In this thesis, we introduce the potential ship detection and management method, which to the best of our knowledge, is the first one made for Vietnamese coastal region using high resolution pan images from VNREDSat-1.
27p tamynhan0 04-07-2020 19 3 Download
-
With Europe’s ageing fleet of nuclear reactors operating closer to their safety limits, the monitoring of such reactors through complex models has become of great interest to maintain a high level of availability and safety.
9p christabelhuynh 29-05-2020 10 1 Download
-
The goal of the simulation strategies is to model complex multi-physics and multi-scale phenomena specific to nuclear reactors. The use of machine learning combined with such advanced simulation tools is also demonstrated to be capable of providing useful information for the detection of anomalies during operation.
14p christabelhuynh 29-05-2020 8 3 Download
-
Lecture Digital image processing: Edge detection presents the following content: Introduction, the sobel operator, the prewitt operator, the canny operator, the zero-crossing detector, the unsharp filter.
14p youcanletgo_04 17-01-2016 54 3 Download
-
IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan promising ports for openness (80, 21, …) Service Evaluation determine the OS Target Selection pick the most vulnerable host, most running services... Vulnerability Probes Automated password attacks FTP, HTTP, NetBIOS, VNC PCAnywhere…. Application specific attacks try known vulnerabilities on present services
9p muathu_102 28-01-2013 71 4 Download
-
Used to communicate IP status and error messages between hosts and routers Uses IP to route its messages between hosts Must be implemented with IP remember, IP is just a packet delivery system transmits and routes datagrams from sources to destinations through a series of interconnected networks it has a checksum in the IP header to detect lost bits no error detection on the datagram payload though but has no native mechanism for source host notification This is where ICMP comes in its used to report IP errors to the source host ICMP data is carried as the payload of an IP datagram specifie...
19p muathu_102 28-01-2013 53 3 Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Flat Zone Analysis and a Sharpening Operation for Gradual Transition Detection on Video Images
11p sting12 11-03-2012 35 4 Download
-
Erratic eating is one of the manifestations of mental disorders. Patients can not eat or drink, or eating too much can not be controlled.For mental health care possible, it is important to reserve the disease, early detection and treatment of disorders to prevent complications, and rehabilitation for patients with community reintegration. However, psychiatric symptoms were relatively discreet, sometimes hard to distinguish from the normal operation
10p thulanh29 17-12-2011 57 2 Download
-
4. SEGMENTATION AND EDGE DETECTION 4.1 Region Operations Discovering regions can be a very simple exercise, as illustrated in 4.1.1. However, more often than not, regions are required that cover a substantial area of the scene rather than a small
14p 0914811815 23-04-2011 97 9 Download
-
khái quát lỗi Secure Network Operations, Inc. http://www.secnetops.com/research Strategic Reconnaissance Team research secnetops com Team Lead Contact kf secnetops com. Our Mission: Operations offers expertise in Networking, Intrusion Detection Systems (IDS), Software Security Validation, and Corporate/Private Network Security. Our mission is to facilitate a secure and reliable Internet and inter-enterprise communications infrastructure through the products and services we offer.
5p tt1991tt 20-02-2011 135 21 Download
-
Secure Network Operations offers expertise in Networking, Intrusion Detection Systems (IDS), Software Security Validation, and Corporate/Private Network Security. Our mission is to facilitate a secure and reliable Internet and interenterprise communications infrastructure through the products and services we offer.
9p ad_uit 08-01-2011 84 10 Download