نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

2014
David N. Gilbert

Objective. To ascertain the influence of a physician infectious diseases specialist (IDS) on antibiotic use in a medical/surgical intensive care unit. Method. Over a 5-month period, the antibiotic regimens ordered by the ICU multidisciplinary team were studied. The days of antibiotic therapy (DOT) when management decisions included an IDS were compared to DOT in the absence of an IDS. The assoc...

2015
Haruko Iwase Toshio Takada Chiaki Iitsuka Hidetaka Nomura Akiko Abe Tomoko Taniguchi Ken Takizawa

OBJECTIVE To investigate the clinical significance of systematic retroperitoneal lymphadenectomy during interval debulking surgery (IDS) in advanced epithelial ovarian cancer (EOC) patients. METHODS We retrospectively reviewed the medical records of 124 advanced EOC patients and analyzed the details of neoadjuvant chemotherapy (NACT), IDS, postoperative treatment, and prognoses. RESULTS Fol...

Journal: :Journal of medical genetics 1999
P Li A B Bellows J N Thompson

Mucopolysaccharidosis type II (Hunter syndrome) is an X linked lysosomal storage disorder resulting from heterogeneous mutations in the iduronate-2-sulphatase (IDS) gene. To detect IDS gene mutations, direct sequencing of IDS cDNA fragments coupled with assays on IDS genomic amplicons was applied to 18 unrelated patients with MPS II. Seventeen mutations were detected from the 18 patients includ...

2015
Jayant Kulkarni

In the age of information technology the facets of work and availability of everything on the internet services so the internet service and applications have become an inextricable part of day today life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web and its various services have moved to a m...

2017
Mohammed Ghaouth BELKASMI Mohammed SABER Sara CHADLI Mohamed EMHARRAF Ilhame EL FARISSI

Modern intrusion detection systems (IDS) are deployed in high-speed networks. Thus, they must be able to process a large amount of data in real time. This raises the issue of performance and required an evaluation of these IDS. We present in this paper an evaluation approach, based on a series of tests. The aim is to measure the performance of the components of an IDS and their effects on the e...

2007
Manami KIKUCHI Takayuki ITOH Hiroki TAKAKURA

Research and development of IDS (intrusion Detection System) is a hot topic for the purpose of security maintenance of computer network. We have already presented a technique for visualizing logs of IDS. However, the present IDS products detect only known suspicious accesses, and therefore we need an extended visualization technique if we would like to visualize the statistics of malicious acce...

Journal: :CoRR 2017
David Wolpert

There are (at least) four ways that an agent can acquire information concerning the state of the universe: via observation, control, prediction, or via retrodiction, i.e., memory. Each of these four ways of acquiring information seems to rely on a different kind of physical device (resp., an observation device, a control device, etc.). However it turns out that certain mathematical structure is...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

شبکه های کامپیوتری جزء اساسی جامعه اطلاعاتی امروزی محسوب می شوند. این شبکه ها معمولا به شبکه سراسری اینترنت متصل هستند. با توجه به این که امنیت از اهداف اولیه طراحی اینترنت نبوده است، در دهه های اخیر امن سازی این شبکه ها در برابر حملات از اهمیـت بسیاری برخوردار شده است. امروزه جهت تأمین امنیت، سیستم ها و ابزارهای امنیتی متفاوتی از جمله سیستم های تشخیص نفوذ (ids)در شبکه ها استفاده می شوند. ids ه...

2012
Raúl Sánchez Álvaro Herrero Emilio Corchado

MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). This on-going research aims to be one step towards adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking...

2012
H. N. Pratihari

Flooding-based route discovery is usually preferred in MANETs in order to set up the route with reliability between transmission pair. However, this approach may cause a serious contention in information transfer between adjacent nodes and a considerable amount of control packets. The transfer of information between nodes is made secured by Intrusion detection system (IDS). The architecture of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید