20 research outputs found
Sistem Pendeteksian Penyusupan Jaringan Komputer dengan Active Response Menggunakan Metode Hybrid Intrusion Detection, Signatures dan Anomaly Detection
The progress of internet technology increase the need of security data. The progress of tools which have intrusion ability, also influence these needed. The methods of Intrusion Detection System (IDS) implementation and methods of analyze intrusion have excess and lack, which mutually completes. There are a lot of IDS now, but just an IDS open source based is snort. Method of snort implementation is network based restricted. This Final Task\u27s system used Hybrid Intrusion Detection System, Signatures and Anomaly Detection Methods. The indicator which used to detect intrusion are IP Address and Port Number. This system use TCP, UDP and ICMP protocols. This system also, is completed by active response, like blocking access for intruder. This System Implementation with Java Programming Language for engine perform and Java Server Pages (JSP) to develop user interface, The database which used is MYSQL. There are two of development test; Link system test and intrusion test. The link system test show the connect each interface. Intrusion is executed by host detection which used DoS HTTP tools and network detection which used Ping of Death\u27s scripts. The intrusion testing conclusions are; can be detected, analyze and active response for intrusion
Methods of Static Buckling Analysis
The aim of this theses is to create application, which is able to calculate buckling load of structure made from 1D bar elements, using finite element method. introduction is devoted to basic principles of buckling and derivation of necessary formulas. Then are described all operations and numerical methods needed for the application. At the and is in detail analyzed few structures and results are compared with known solutions or with other applications
Supplementary material from A Bayesian approach to identifying the role of hospital structure and staff interactions in nosocomial transmission of SARS-CoV-2
Additional details of the hospital network, MCMC algorithm and sensitivity analysis
Baseline characteristics and reported risk exposure of participants.
<p>*43 participants had more than one identified risk factors.</p>§<p>Denominator varies due to missing data in some categories.</p><p>MSM: men-who-have-sex-with-men CSW: commercial sex work (bought or sold sex).</p
Fourth generation HIV rapid test and laboratory results.
<p>POCT: Point of care rapid test for HIV, EIA: Enzyme-linked immunosorbent assay, Ab: antibody, Ag: antigen, Gen: generation.</p
Additional file 1: of Health surveillance assistants as intermediates between the community and health sector in Malawi: exploring how relationships influence performance
Topic guide SSI â Close-to-community (CTC) providers: Health Surveillance Assistants (HSAs). (DOCX 20Â kb
Training and supervision needs identified by study participants.
<p>Training and supervision needs identified by study participants.</p
Additional file 1 of Support, not blame: safe partner disclosure among women diagnosed with HIV late in pregnancy in South Africa and Uganda
Supplementary Material
Self-reported information given about the tests at first ANC visit among 480 interviewed women.
<p>Self-reported information given about the tests at first ANC visit among 480 interviewed women.</p
Indicators of adoption, fidelity, and proposed success endpoints [51].
<p>Indicators of adoption, fidelity, and proposed success endpoints [<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0198784#pone.0198784.ref051" target="_blank">51</a>].</p