منابع مشابه
A Binarization Method for Degraded Document Images with Morphological Operations
In this paper, we propose an effective binarization method for de-graded document images in this paper. This method employs morphological operations throughout its algorithm to suppress uneven illumination in the background region, to detect the character location and to reconstruct text regions. Moreover, a technique for estimating stroke width of characters is introduced to remove noises in a...
متن کاملA RAID reconfiguration scheme for gracefully degraded operations
One distinct advantage of Redundant Array of Independent Disks (RAID) is fault tolerance. But the performance of a disk array in degraded mode is so poor that no one uses the RAID after failure. Continuous operation of RAID in degraded mode is very important in many real time applications, which can not be interrupted in providing continuous services. In this paper, we propose an efficient arch...
متن کاملConsiderations for Cloud Security Operations
1 Abstract—Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed.
متن کاملReliability Analysis of Redundant Repairable System with Degraded Failure
This investigation deals with the transient analysis of the machine repair system consisting of M-operating units operating under the care of single repairman. To improve the system reliability/availability, Y warm standby and S cold standby units are provided to replace the failed units. In case when all spares are being used, the failure of units occurs in degraded fashion. In such situation ...
متن کاملSonification in Security Operations Centres: What do Security Practitioners Think?
In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy Magazine
سال: 2011
ISSN: 1540-7993
DOI: 10.1109/msp.2011.149