نتایج جستجو برای: outflow intrusions
تعداد نتایج: 23227 فیلتر نتایج به سال:
Computer networks frequently collapse under the destructive intrusions. It is crucial to detection hidden intrusions to protect the computer networks. However, a computer intrusion often distributes high dimensional characteristic signals, which increases the difficulty of intrusion detection. Literature review indicates that limited work has been done to address the nonlinear dimension reducti...
Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially malicious, input. When these replicas are constructed using off-the-shelf software products, it is assumed that they are diverse and not compromised simultaneously under the same attack. In this paper, we analyze vulnerabilities...
OBJECTIVES To determine whether dementia with Lewy bodies (DLB) and Alzheimer's disease (AD) can be differentiated on the basis of qualitative performance characteristics during neuropsychological evaluation. METHODS Forty one patients with clinically defined DLB were matched with 26 patients with AD for age, illness duration, nature and severity of cognitive deficits, and regional blood flow...
Principal component analysis (PCA) is frequently used in geosciences for information extraction. In many applications,masking PCA has been used to create subsets of samples or sub-areas to enhance the effect of themain objects of interest. In this paper we suggest how the representativeness of samples or pixels can be quantified using a fuzzy membership function based on fuzzy set theory. In th...
BACKGROUND During childhood emotional maltreatment (CEM) negative attitudes are provided to the child (e.g., "you are worthless"). These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions) of these memories, which may occur ...
Through theory and numerical simulations in an axisymmetric geometry, we examine evolution of a symmetric intrusion released from a cylindrical lock in stratified fluid as it depends upon the ambient interface thickness, h, and the lock aspect ratio Rc/H, in which Rc is the lock radius and H is the ambient depth. Whereas self-similarity and shallow-water theory predicts that intrusions, once es...
Because of Rachman and de Silva's (1978) influential research on normal and abnormal obsessions, it is now a basic tenet of cognitive behavioral theories (CBT) that clinical obsessions have their origins in the normal intrusive thought phenomena that characterizes the stream of consciousness. However much of the empirical research on unwanted intrusive thoughts has utilized retrospective self-r...
This paper puts forward a generic intrusion-avoidance architecture to be used for deploying web services on the cloud. The architecture, targeting the IaaS cloud providers, avoids intrusions by employing software diversity at various system levels and dynamically reconfiguring the cloud deployment environment. The paper studies intrusions caused by vulnerabilities of system software and discuss...
Accessory mitral valve tissue, a rare cause of left ventricular outflow tract obstruction, can be difficult to diagnose preoperatively and confusing even at surgery. The reported case illustrates how preoperative evaluation can be made using two-dimensional echocardiography combined with Doppler flow analysis. The intraoperative technique for removing the accessory tissue without causing damage...
in the area sw of arak, intrusives are emplaced into metasediments of early mesozoic age. the intrusive rocks vary in morphology, structure and mineralogy, and exhibit various degrees of alterations; rb-sr geochronological data have been obtained to constrain their timing. there are three different groups of granitic rocks in the area: (a) the astaneh intrusion, consisting of granite, biotite g...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید