نتایج جستجو برای: absorbed dos

تعداد نتایج: 147908  

2013
Anderson Uilian Kauer Viviane Pereira Moreira

A mineração temporal de textos (temporal text mining TTM) é uma técnica cujo objetivo é descobrir a estrutura latente e padrões temporais em coleções de texto. Estas características são importantes em coleções em que os tópicos de interesse mudam frequentemente com o passar do tempo. Além disso, a mineração temporal de textos é útil em ferramentas de sumarização e descoberta de tendências. Nest...

2002
Márcia C. C. de Oliveira Mário G. de Carvalho Cleber J. da Silva Alceni A. Werle

O fracionamento cromatográfico dos extratos orgânicos das folhas e galhos de Luxemburgia nobilis (Ochnaceae) forneceu o sitosterol, sitosterol-3-O-βD-glicopiranosil, friedelina, friedelinol, a mistura dos triterpenos lupeol, α-amirina e β-amirina, rutina, epicatequina, uma mistura de duas chalconas, isoliquiritigenina e 3’-hidróxiisoliquiritigenina, duas biflavonas conhecidas, amentoflavona e r...

Journal: :Physical review letters 2005
O Tal Y Rosenwaks Y Preezant N Tessler C K Chan A Kahn

We investigate the density of states (DOS) for hole transport in undoped and doped amorphous organic films using high lateral resolution Kelvin probe force microscopy. Measurements are done on field effect transistors made of N,N1-diphenyl-N, N1-bis(1-naphthyl)-1,10-biphenyl-4,4II-diamine undoped or p doped with tetrafluoro-tetracyanoquinodimethane. We determine the DOS structure of the undoped...

2015
Monika Malik

Wireless sensor networks (WSNs) are a special type of Ad-hoc network. WSNs are easily subjected to intentional or unintentional attacks as compared to wired based networks. Denial of Service (DoS) attack is one of the main threats that the network is facing. DoS attack makes use of many hosts to send a lot of useless packets to the target in short time of invalid access which will consume the t...

2010
R Vijayasarathy Balaraman Ravindran S V Raghavan

Denial of Service(DoS) attacks pose a big threat to any electronic society. DoS and DDoS attacks are catastrophic particularly when applied to highly sensitive targets like Critical Information Infrastructure. While research literature has focussed on using various fundamental classifier models for detecting attacks, the common trend observed in literature is to classify DoS attacks into the br...

2005
Danilo Freire

JUSTIFICATIVA E OBJETIVOS: Desde tempos imemoriais, o ópio e os seus derivados, além de exercerem ponderável influência sobre o comportamento dos seres humanos, têm sido empregados como sedativo e como analgésico. A partir do século XIX, com o isolamento dos alcalóides do ópio e as facilidades para o emprego dessas substâncias por via parenteral, houve aumento do interesse pelo uso criterioso d...

Journal: :Analytical chemistry 2004
Yukie Sasakura Katsuhiro Kanda Tokiko Yoshimura-Suzuki Takuya Matsui Shinichi Fukuzono Moon Hi Han Toru Shimizu

A highly sensitive microarray system for detecting protein-protein interactions has been developed. This method was successfully applied to analyze the interactions of heme-regulated phosphodiesterase from Escherichia coli (Ec DOS). To immobilize (His)6-Tag fused Ec DOS, anti-(His)6-Tag monoclonal antibody (anti-(His)6-Tag mAb) was initially immobilized on the solid surface, and (His)6-Tag fuse...

2014
Ankit Rajpal

In this paper, we simulated Collusion and Network partition DoS attacks using GlomoSIm (GLobal MObile information system SIMulator). The network with 36 nodes in grid pattern was chosen. Throughput analysis with and without DoS attack was carried out for varying number of nodes. The importance of fairness in MAC layer is also justified through the results obtained. Keywords— DoS, Collusion, Par...

2013
Ali Rahnama Saeed Zavareh Mohammad Taghi Ghorbanian Isaac Karimi

BACKGROUND In spite of extensive efforts to improve in vitro oocyte maturation, the obtained results are not very efficient. This study was conducted to assess impacts of cAMP elevating agents and alpha lipoic acid (ALA) on in vitro oocyte maturation and fertilization. METHODS Mouse germinal vesicle (GV) oocytes were categorized into cumulus denuded oocytes (DOs; n=896) and cumulus oocyte com...

2003
Rajani Muraleedharan Lisa Ann Osadciw

Sensors have varied constraints, which makes the network challenging for communicating with its peers. In this paper, an extension to the security of physical layer of a predictive sensor network model using the ant system is proposed. The Denial of Service (DoS) attack on sensor networks not only diminishes the network performance but also affects the reliability of the information making dete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید