نتایج جستجو برای: مدل ids
تعداد نتایج: 125300 فیلتر نتایج به سال:
Background and Aim: Veterans and individuals with physical disabilities are often exposed to problems such as social discrimination, lack of independent living, and inability to participate in daily activities. The purpose of the present study was to designing and developing the Impact of disability scale (IDS) in Veterans and individuals with a physical disability. Methods: This is a descripti...
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The...
Intrusion detection and secure routing schemes have been proposed for increasing the security and reliability in critical scenarios like mobile ad hoc networks. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and SUCV (Statistically Unique and Cryptographically Verifiable) identifiers. The proposed IDS has been used for the support of secu...
OBJECTIVE The aim of the present study was to investigate the surgical complexity, the postoperative morbidity, and the survival of the women after primary debulking surgery (PDS) and neoadjuvant chemotherapy followed by interval debulking surgery (NACT-IDS) for advanced epithelial ovarian cancer. MATERIALS AND METHODS We consecutively included all patients who underwent debulking surgery at ...
BACKGROUND Mucopolysaccharidosis type II (MPS II) is a lysosomal storage disorder related to a deficiency in the enzyme iduronate-2-sulfatase (IDS). Clinical trials of enzyme replacement therapy are in progress, but effective treatment will require screening assays to enable early detection and diagnosis of MPS II. Our study evaluated the diagnostic accuracy of IDS protein and enzyme activity m...
نظریه بازیها به عنوان یک رویکرد جدید برای مدل کردن برخی مشکلهای شبکههای حسگر بیسیم از جمله مسیریابی، تجمیع دادهها و تشخیص نفوذ مورد استفاده قرار میگیرد. این شبکهها به دلیل داشتن محدودیت منابع انرژی و حافظه میتوانند توسط گرههای مخرب مورد نفوذ قرار گیرند. این گرهها در تلاش هستند تا با مصرف بیهوده انرژی گرهها باعث ایجاد اختلال در شبکه شوند. تشخیص و جلوگیری از نفوذ گرهها میتواند به عنو...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and power resources, has become an essential mechanism for resource management numerous applications. The growth of the volume variety data traffic on Internet leads to concerns robustness cyberphysical systems especially critical infrastructures. Therefore, i...
We consider the problem of inferring the opinions of a social network through strategically sampling a minimum subset of nodes by exploiting correlations in node opinions. We first introduce the concept of information dominating set (IDS). A subset of nodes in a given network is an IDS if knowing the opinions of nodes in this subset is sufficient to infer the opinion of the entire network. We f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید