نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1990
P J Wilson C P Morris D S Anson T Occhiodoro J Bielicki P R Clements J J Hopwood

Iduronate 2-sulfatase (IDS, EC 3.1.6.13) is required for the lysosomal degradation of heparan sulfate and dermatan sulfate. Mutations causing IDS deficiency in humans result in the lysosomal storage of these glycosaminoglycans and Hunter syndrome, an X chromosome-linked disease. We have isolated and sequenced a 2.3-kilobase cDNA clone coding for the entire sequence of human IDS. Analysis of the...

2012
Joffre Gavinho Filho Luiz F. R. C. Carmo Raphael Machado Luci Pirmez

An Intrusion Detection System (IDS) for Cognitive Radio Network (CRN) is proposed. The considered IDS is constructed by combining two classic mechanisms for CRN intrusion detection, namely the Localization mechanism and the Reputation mechanism. The composition of the mechanisms is done with the aid of a Genetic Algorithm (GA) responsible for calibrating the IDS, that is, for attributing “weigh...

Journal: :NeuroImage 2011
Yoshi-Taka Matsuda Kenichi Ueno R. Allen Waggoner Donna Erickson Yoko Shimura Keiji Tanaka Kang Cheng Reiko Mazuka

Adults typically address infants in a special speech mode called infant-directed speech (IDS). IDS is characterized by a special prosody (i.e., higher pitched, slower and hyperarticulated) and a special lexicon ("baby talk"). Here we investigated which areas of the adult brain are involved in processing IDS, which aspects of IDS (prosodic or lexical) are processed, to what extent the experience...

Journal: : 2022

در این پژوهش سعی می‌­شود مدلی برای شبیه‌­سازی چرخه عمر صنعت برق با استفاده از شبیه‌سازی عامل­بنیان ارائه شود، مدل، 5 عامل استخراج شد و شبیه­‌سازی به کمک نرم‌افزار Anylogic صورت پذیرفت. بهینه‌­سازی مدل چهار سناریو نظر خبرگان شد. سناریوی نخست، جذابیت نیروگاه گازی سیکل ترکیبی کاهش یافت بر دو دیگر افزوده نتیجه افزایش تولید آبی است که توجه کمبود منابع کشور به‌صرفه نیست. دوم ورود یک فناوری جدید میزان...

1992
Ming-Chin Lu

Image Defocus Simulator (IDS) is an interactive research software tool developed to simulate the image sensing/formation process in a typical CCD camera system. IDS takes as input the camera parameters and the scene parameters. It produces as output a digital image of the scene as sensed by the camera. IDS consists of a number of distinct modules each implementing one step in the computational ...

1996
Steve Jones Stephen Lundy Gordon W. Paynter Gordon W Paynter

This paper describes the Interactive Document Summariser (IDS), a dynamic document summarisation system, which can help users of digital libraries to access on-line documents more effectively. IDS provides dynamic control over summary characteristics, such as length and topic focus, so that changes made by the user are instantly reflected in an on-screen summary. A range of ‘summary-in-context’...

2012
Jeesun Kim Chris Davis Christine Kitamura

We investigated how the properties of Infant Directed Speech (IDS) and Adult Directed Speech (ADS) differed in acoustics and in speech-related articulation. Both the degree to which auditory and motion properties changed as a function of speech style (IDS vs. ADS) as well as how the correlation between properties was affected by this change were examined. The acoustic properties of 13 sentences...

2013
R. Sridevi

Intrusion-detection systems (IDS) which were essential in computer security because of difficulties in ensuring the information systems are security free. Literature has numerous intrusion detection approaches for network security. IDS efficiency was based on the ability to differentiate between normal and harmful activity. Hence, it becomes crucial to achieve better detection rates and lower f...

2015

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید