5 resultados para False negatives

em Cochin University of Science


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis report results obtained from a detailed analysis of the fluctuations of the rheological parameters viz. shear and normal stresses, simulated by means of the Stokesian Dynamics method, of a macroscopically homogeneous sheared suspension of neutrally buoyant non-Brownian suspension of identical spheres in the Couette gap between two parallel walls in the limit of vanishingly small Reynolds numbers using the tools of non-linear dynamics and chaos theory for a range of particle concentration and Couette gaps. The thesis used the tools of nonlinear dynamics and chaos theory viz. average mutual information, space-time separation plots, visual recurrence analysis, principal component analysis, false nearest-neighbor technique, correlation integrals, computation of Lyapunov exponents for a range of area fraction of particles and for different Couette gaps. The thesis observed that one stress component can be predicted using another stress component at the same area fraction. This implies a type of synchronization of one stress component with another stress component. This finding suggests us to further analysis of the synchronization of stress components with another stress component at the same or different area fraction of particles. The different model equations of stress components for different area fraction of particles hints at the possible existence a general formula for stress fluctuations with area fraction of particle as a parameter

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has long been said that market itself is the ideal regulator of all evils that may come up among traders. Free and fair competition among manufacturers in the market will adequately ensure a fair dealing to the consumers. However, these are pious hopes. that markets anywhere in the world could not accomplish so far. Consumers are being sought to be lured by advertisements issued by manufacturers and sellers that are found often false and misleading. Untrue statements and claims about quality and performance of the products virtually deceive them. The plight of the consumers remains as an unheard cry in the wildemess. In this sorry state of affairs, it is quite natural that the consumers look to the governments for a helping hand. It is seen that the governmental endeavours to ensure quality in goods are diversified. Different tools are formulated and put to use, depending upon the requirements necessitated by the facts and circumstances. This thesis is an enquiry into these measures

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elasmobranchs comprising sharks, skates and rays have traditionally formed an important fishery along the Indian coast. Since 2000, Indian shark fishermen are shifting their fishing operations to deeper/oceanic waters by conducting multi-day fishing trips, which has resulted in considerable changes in the species composition of the landings vis- a-vis those reported during the 1980’s and 1990’s. A case study at Cochin Fisheries Harbour (CFH), southwest coast of India during 2008-09 indicated that besides the existing gillnet–cum- hooks & line and longline fishery for sharks, a targeted fishery at depths >300-1000 m for gulper sharks (Centrophorus spp.) has emerged. In 2008, the chondrichthyan landings (excluding batoids) were mainly constituted by offshore and deep-sea species such as Alopias superciliosus (24.2%), Carcharhinus limbatus (21.1%), Echinorhinus brucus (8.2%), Galeocerdo cuvier (5.4%), Centrophorus spp. (7.3%) and Neoharriotta pinnata (4.2%) while the contribution by the coastal species such as Sphyrna lewini (14.8%), Carcharhinus sorrah (1.4%) and other Carcharhinus spp. has reduced. Several deep-sea sharks previously not recorded in the landings at Cochin were also observed during 2008-09. It includes Hexanchus griseus, Deania profundorum, Zameus squamulosus and Pygmy false catshark (undescribed) which have been reported for the first time from Indian waters. Life history characteristics of the major fished species are discussed in relation to the fishery and its possible impacts on the resource