intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Safety algorithm

Xem 1-20 trên 152 kết quả Safety algorithm
  • The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services.

    pdf4p longtimenosee06 27-03-2024 2 1   Download

  • The study aimed to help get insights about the causes of road accidents, and to provide knowledge of road accidents for road safety using Association Rule Mining with the application of the Apriori Algorithm. Association rule mining using the Apriori Algorithm produces significant patterns and insights that help identify the causes of road accidents.

    pdf9p vigojek 02-02-2024 8 2   Download

  • In this report, we develop a low-cost cyclic voltammetry platform for electrochemical analyses based on the LMP91000 integrated circuit (IC). The proposed system can be suitable to detect chemicals of interest in food safety or biology. The system includes three main blocks: the electrodes, electrochemical measuring circuit, and data acquisition. An algorithm was also built to process and display the data on the screen.

    pdf6p vimichaelfaraday 28-12-2023 11 4   Download

  • This approach utilizes the You Only Look Once (YOLO) v3 algorithm combined with a Convolutional Neural Network (CNN) to early detect and assess fire rick for indoors alert. The results showed that the proposed solution is promising for decision making and early handling fire beforehand to ensure the safety inside buildings.

    pdf7p viengels 25-08-2023 5 4   Download

  • Agency for Healthcare Research and Quality (AHRQ) software applies standardized algorithms to hospital administrative data to identify patient safety indicators (PSIs). The objective of this study was to assess the validity of PSI flags and report reasons for invalid flagging.

    pdf6p visteverogers 24-06-2023 5 2   Download

  • Lecture "On safety and security of information systems: Asymmetric ciphers" provide students with knowledge about: principles of public-Key cryptosystems; RSA algorithm;... Please refer to the detailed content of the lecture!

    pdf23p hoabingan205 12-12-2022 9 5   Download

  • With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.

    pdf8p vimelindagates 18-07-2022 50 5   Download

  • Lecture Operating systems: Lesson 28 - Dr. Syed Mansoor Sarwar. The main topics covered in this lesson include: deadlock avoidance, RAG for deadlock avoidance, banker’s algorithms, safety algorithm, safe sequence, RAG algorithm, claim edge converts to request edge when a process requests a resource,...

    pdf45p youzhangjing_1909 28-04-2022 9 4   Download

  • Several reports have shown that postoperative monitoring of general safety and quality issues, including pain treatment, after discharge from recovery is often non-systematic and inadequate. We suggest a new score with assessment of key recovery parameters, as a supportive tool for postoperative care and a call-out algorithm for need of extra help. The aim of this investigation was to validate the score.

    pdf10p viottohahn 30-03-2022 10 1   Download

  • In this paper we describe a watermarking algorithm that can protect and verify the integrity of (Deep) Neural Networks when deployed in safety critical systems, such as autonomous driving systems or monitoring and surveillance systems.

    pdf14p guernsey 28-12-2021 22 1   Download

  • In this paper, with the target to improve safety level of digital signature algorithms, we present the proposed method for constructing digital signature algorithms which is based on a new key scheme. This new key format is constructed using a new difficulty problem without high-efficiency solution and it can be applied to construct digital signature algorithms. According to this research, a high-security digital signature class can be construct by the proposed method in some actual situation.

    pdf7p luuhongdung 09-09-2021 56 40   Download

  • Periodic structural health survey is an important task to ensure the safety and serviceability of buildings. This study aims at developing a computer vision tool to segment images capturing surface of reinforced concrete structures. The image processing technique of Gabor filter is used with k-Means clustering algorithm and principal component analysis to automatically segment damages on concrete surface including spall, crack, bughole, and stain.

    pdf6p nguaconbaynhay12 01-06-2021 13 1   Download

  • In this paper, by incorporating knowledge of the physical system under control, we proposed the new method to detect computer attacks that change the behavior of the targeted industrial control system. By using knowledge of the physical system we are able to focus on the final objective of the attack, and not on the particular mechanisms of how vulnerabilities are exploited, and how the attack is hidden. We also analyze the safety of our solution by exploring the effects of stealthy attacks, and by hopping that automatic attack-response mechanisms will not drive the system to an unsafe state.

    pdf8p quenchua9 20-11-2020 10 1   Download

  • To counteract the advantages and the weaknesses of DNA-Based cryptographic, we are to discuss and provide a thorough description of the cryptography algorithm of DNA-Based cryptographic, the uniqueness of the algorithm, the safety of algorithms and also a review of analysis on the performance of DNA-based algorithms with DNA characteristics.

    pdf5p byphasse043256 24-03-2019 25 1   Download

  • In this paper, we propose the predictor of the Emergency Braking System (EBS), which adapts to driver’s intentions. For design of such system, we mainly made fuzzy predictor and fuzzy Driver Intention Reader (DIR), using fuzzy algorithm. And, we simulated several typical situations to evaluate the system performance. As a result, we have confirmed the functionality and reliability of the system logics.

    pdf5p praishy2 27-02-2019 36 0   Download

  • The reliability and the accuracy of the vehicle detection algorithm for the application of road safety can be further boosted by applying method of image processing onto the data obtained through the industrial camera.

    pdf4p praishy2 27-02-2019 32 0   Download

  • In this paper we have discussed the application of the Simplex method in checking software safety - the application in automated detection of buffer overflows in C programs. This problem is important because buffer overflows are suitable targets for hackers' security attacks and sources of serious program misbehavior.

    pdf16p vinguyentuongdanh 19-12-2018 33 1   Download

  • In this paper, we propose an efficient navigation framework for autonomous mobile robots in dynamic environments using a combination of a reinforcement learning algorithm and a neural network model. The main idea of the proposed algorithm is to provide the mobile robots the relative position and motion of the surrounding objects to the robots, and the safety constraints such as minimum distance from the robots to the obstacles, and a learning model. We then distribute the mobile robots into a dynamic environment.

    pdf12p thuyliebe 05-10-2018 51 1   Download

  • This paper simulates the installation and implementation of cryptographic algorithm on a FPGA using Isim software from Xilinx. The result shows that the implementation of 128-bit Advanced Encryption Standard-AES improved considerably the operating speed by 565000 ps for both encryption and decryption process.

    pdf6p truongtien_09 08-04-2018 34 2   Download

  • Developing Trustworthy Database Systems for Medical Care includes about Security and Safety of Medical Care Environment; Access Control; Using Trust and Roles for Access Control; Classification Algorithm for Access Control to Detect Malicious Users.

    ppt15p cocacola_17 11-12-2015 53 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
4=>1