نتایج جستجو برای: leak detection
تعداد نتایج: 579422 فیلتر نتایج به سال:
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data. Instead, only a small amount of specialized digests are needed. Our technique – referred to as the fuzzy fingerprint – can be used to detect accidental data leaks due to human errors or application flaws. Th...
INTRODUCTION Bile leak after liver injury has been reported to be a complication associated with significant mortality. Tc99m-IDA (Tc: Technetium) nuclear scan allows rapid and noninvasive diagnosis of bile leak. OBJECTIVE An accidental case was referred for the detection of suspicious bile leak. METHODS The ultrasound could not detect any abnormality. Dynamic Hepatobiliary Scintigraphy (DH...
In this paper, a leak detection and isolation methodology in pressurized water pipe networks is proposed. The methodology is based on computing residuals which are obtained comparing measured pressures (heads) in selected points of the network and their estimated values by means of an interval Linear Parameter Varying (LPV) model. The structure of the LPV models is obtained from the nonlinear m...
In light of the problems of low recognition efficiency, high false rates and poor localization accuracy in traditional pipeline security detection technology, this paper proposes a type of hierarchical leak detection and localization method for use in natural gas pipeline monitoring sensor networks. In the signal preprocessing phase, original monitoring signals are dealt with by wavelet transfo...
In this study, a small leak detection method based on variational mode decomposition (VMD) and ambiguity correlation classification (ACC) is proposed. The signals acquired from sensors were decomposed using the VMD, and numerous components were obtained. According to the probability density function (PDF), an adaptive de-noising algorithm based on VMD is proposed for noise component processing ...
Data leaks on personal computers and organization networks may be caused by mistakes of users (e.g., accidentally sending sensitive documents to a wrong recipient), stolen laptops, malicious insiders, and infection with malicious software. Preventing data leaks typically require a suite of security technologies, including firewalls and intrusion detection/prevention systems at the network, as w...
In this paper we present a simple cumulative sum algorithm for detection of leaks in open water channels. The algorithm compares the observed changes in water levels against the known inand out-flows and raises an alarm if they are not in agreement. The algorithm is tested on data from an irrigation channel with very good results. Leaks are quickly detected and the algorithm is robust against u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید