نتایج جستجو برای: danger theory

تعداد نتایج: 795516  

2017
Kamahazira Zainal Mohd Zalisham Jali

Now-a-days, data is flowing with various types of information and it is absolutely enormous and moreover, it is in unstructured form. These raw data is meaningless unless it is processed and analyzed to retrieve all the valuable and meaningful information. In this paper, a design and principal functionalities of the system prototype is introduced. A process of information retrieval by applying ...

2012
Meriem Zekri Labiba Souici-Meslati

One of the central challenges with computer security is determining the difference between normal and potentially harmful activity. For decades, developers have protected their systems using classical methods. However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensives tools. Promising solutions are emerging with bio...

Journal: :Expert Syst. Appl. 2010
C. A. Laurentys Reinaldo M. Palhares Walmir M. Caminhas

This paper presents a methodology that enables fault detection in dynamic systems based on recent immune theory. The fault detection is a challenging problem due to increasing complexity of processes and agility necessary to avoid malfunction or accidents. The fault detection central challenge is determining the difference between normal and potential harmful activities at dynamic systems. A pr...

2009
John Drury

Accounts from over 90 survivors and 56 witnesses of the 2005 London bombings were analysed to determine the relative prevalence of mass behaviors associated with either psychosocial vulnerability (e.g. ‘selfishness’, mass panic) or collective resilience (e.g. help, unity). ‘Selfish’ behaviors were found to be rare; mutual helping was more common. There is evidence for (a) a perceived continued ...

2002
Joshua Mitteldorf David H. Croll S. Chandu Ravela

Individual selection favors that predator which can most efficiently turn its prey into increased reproductive capacity. But any species that becomes too successful in this game sows the seed of its own demise; for its progeny may be delivered into an environment where prey populations are depleted, and starvation a danger. From this danger derives a compensatory evolutionary pull toward modera...

Journal: :CoRR 2010
Jungwon Kim Julie Greensmith Jamie Twycross Uwe Aickelin

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

2014
Meriem Zekri Labiba Souici-Meslati

One of the central challenges with computer security is determining the difference between normal and potentially harmful behavior. For decades, developers have protected their systems using classical methods. However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensive tools. Promising solutions are emerging with biol...

Journal: :Environmental Modelling and Software 2009
J. J. Sharples R. H. D. McRae R. O. Weber A. M. Gill

Fire danger rating systems are used to assess the potential for bushfire occurrence, fire spread and difficulty of fire suppression. Typically, fire danger rating systems combine meteorological information with estimates of the moisture content of the fuel to produce a fire danger index. Fire danger indices are used to declare fire bans and to schedule prescribed burns, among other applications...

Journal: :Circulation research 2015
Sebastian Zimmer Alena Grebe Eicke Latz

All aspects of the pathogenesis of atherosclerosis are critically influenced by the inflammatory response in vascular plaques. Research in the field of innate immunity from the past 2 decades has uncovered many novel mechanisms elucidating how immune cells sense microbes, tissue damage, and metabolic derangements. Here, we summarize which triggers of innate immunity appear during atherogenesis ...

Journal: :Medicine, Health Care, and Philosophy 2007
Gerben Meynen Jacco H. P. Verburgt

In his recent and interesting contribution On Heidegger, medicine, and the modernity of modern medical technology Brassington brings together Heidegger s philosophy of technology on the one hand and medicine as being increasingly dependent on modern technology on the other (Brassington, 2006). Technology, for Heidegger, as Brassington points out, is associated with danger. Given the central rol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید