817 resultados para Intrusion Detection, Computer Security, Misuse
Resumo:
Background: The glycosylated hemoglobin (HbA1c) is used to help monitor the degree of a diabetic’s hyperglycemia. Security and accuracy of the methods used in its detection are affected by variants forms of Hb or elevations in levels of Fetal Hb (HbF). These interference are the result of a change in the haemoglobin total net charge of the variant due of a substitution of one amino acid in the remaining amino terminal of the beta chain. International Standardization for HbA1c values (NGSP) not include interference assessment as part of the certification program. Therefore, the effect of each variant or the lifting of the HbF on HbA1c result should be examined in each sample depending on the detected variant and the method used for the detection of the same. The objectives were: to describe the possible variants of Hb and their interference in HbA1c measurement by our method, after the implementation of a computer program for their detection. To identify some variants detected by chromatography liquid ion exchange high resolution (HPLC) with DNA molecular sequencing.
Resumo:
Computer-Aided Tomography Angiography (CTA) images are the standard for assessing Peripheral artery disease (PAD). This paper presents a Computer Aided Detection (CAD) and Computer Aided Measurement (CAM) system for PAD. The CAD stage detects the arterial network using a 3D region growing method and a fast 3D morphology operation. The CAM stage aims to accurately measure the artery diameters from the detected vessel centerline, compensating for the partial volume effect using Expectation Maximization (EM) and a Markov Random field (MRF). The system has been evaluated on phantom data and also applied to fifteen (15) CTA datasets, where the detection accuracy of stenosis was 88% and the measurement accuracy was with an 8% error.
Resumo:
Department of Computer Applications, Cochin University of Science and Technology
Resumo:
This paper discusses our research in developing a generalized and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions. Using experiments on the sendmail system call data, we demonstrate that concise and accurate classifiers can be constructed to detect anomalies. An overview of the approach that we have implemented is provided.
Resumo:
This is one of two presentations we have produced for the resource set part of the INFO2009 Assignment 2 Group Poster.
Resumo:
This is the reference lists for the resource set we have produced for the INFO2009 Assignment 2 Group Poster.
Resumo:
This is the poster about the resource set we have produced for the INFO2009 Assignment 2 Group Poster.
Resumo:
This is the poster about the resource set we have produced for the INFO2009 Assignment 2 Group Poster.
Resumo:
As part of the INFO2009 coursework; an interactive resource set to teach students about the Computer Misuse Act, encompassing an explanation of the law and multiple-choice questions.
Resumo:
Group SD's poster for the INFO2009 coursework on Computer Misuse.
Resumo:
collectively edited resource for INFO2009 initially created as a demonstrator