The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
A numerical study on the flow over a square cylinder in the vicinity of a wall is conducted for different Couette-Poiseuille-based non-uniform flow with the non-dimensional pressure gradient P varying from 0 to 5. The...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical ...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical model for predator and generalist predator of our proposed model. Harvesting effort for the generalist predator is considered and the density-dependent mortality rate for predator and generalist predator is incorporated in our proposed model. Local stability as well as global stability for the system is dis- cussed. We analyze the different bifurcation parameters to evaluate Hopf bifurcation in the neighborhood of interior equilibrium point. Finally, some numerical simulations and graphical figures are provided to verify our analytical results with the help of different sets of parameters.
Technical Debt is a recent concept, borrowed from the financial domain. It has been recently used in software development to describe technical sub-optimal solutions that have short-term benefits but long-term extra-c...
详细信息
L(0, 1)-labelling of a graph G= (V, E) is a function f from the vertex set V(G) to the set of non-negative integers such that adjacent vertices get number zero apart, and vertices at distance two get distinct num...
详细信息
In this paper, it is shown that all programmes of all television channels can be modelled as an interval graph. The programme slots are taken as the vertices of the graph and if the time duration of two programme slot...
详细信息
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big Data era, as most data available is in the form of unstructured texts. Our testin...
详细信息
This paper focuses on the latest version of a tool developed within the department to guide developer through the various steps of requirements, test-procedures and documentations to finally download the derived algor...
详细信息
The SCIP Optimization Suite provides a collection of software packages for mathematical optimization centered around the constraint integer programming framework SCIP. This paper discusses enhancements and extensions ...
详细信息
暂无评论