Registered since September 28th, 2017
Has a total of 3394 bookmarks.
Showing top Tags within 13 bookmarks
Tag selected: detection.
Saved by uncleflo on January 6th, 2019.
This new standard defines three test charts. The new Imatest eSFR ISO module performs a highly automated analysis of the new low contrast (4:1) Edge SFR chart and is available in Imatest Master and Image Sensor 4.0. This chart does not work with the highly automated Imatest eSFR ISO module, described below. For highly automated measurements (including squares near the corners, color patches, and wedges) we recommend one of the Imatest eSFR ISO charts shown below. These charts are fully compliant with ISO 12233:2017. Supported by the Imatest Star Chart module. Optional automatic region detection is available when used with a star pattern that has registration marks on the sides of the image.
sharpness glare sharp wedge automate reflective square module finer diagonal compliant photographic frame conform chart detection recommend enhanced aspect horizontal image requirement compliance corners edge vertical angle contrast test testing photography camera lens iso analysis registration video resolution compare
Saved by uncleflo on June 30th, 2017.
The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.
Saved by uncleflo on December 7th, 2014.
Hallo, Im working on the collision detection part of my program and have it partially working. Right now it works in some cases, but fails in other A triangle made like this works.
raytracer study detection program development solution guide discussion forum triangle case physics game intersection code ray work collision partial suggestion howto cpp c++ compile math advice community
Saved by uncleflo on November 14th, 2014.
Redscan enables businesses to manage their IT security risks by providing a subscription service that combines the people, process, technology, and intelligence needed to proactively identify and manage threats and breaches. The IT security challenge facing most businesses today is that cyber-attacks are increasingly advanced and too easily evade traditional signature-based defences such as next generation firewall, IPS and anti-virus. Organisations need to be able to identify and stop these attacks quickly before they cause significant damage. However, the time, resource, and cost to do this effectively is too high.
red scan business it security risk provide secure network threat detection client industry design size experience guide device manage event report forensic install operation centre deliver technology intelligence advanced subscribe service attack preventative prevent account law study certification deploy reduce mountain data incident
Saved by uncleflo on September 2nd, 2014.
Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion. Read more at http://junkee.com/google-maps-has-been-tracking-your-every-move-and-theres-a-website-to-prove-it/39639#LcAcPVvVY28uzmSR.99
story google location track move website map data transparancy central database detection scan sensor gps phone show demonstrate useful interesting world article privacy breach challenge nerd technical
Saved by uncleflo on September 12th, 2013.
This article shows how to install and configure mod_security. mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc. In the first chapter I will show how to install mod_security on Debian Sarge, Ubuntu 6.06 LTS (Dapper Drake), and on Fedora Core 5, and in the second chapter I will describe how to configure Apache for mod_security which is independent from the distribution you're using. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!
Saved by uncleflo on May 17th, 2013.
ISPrime is a privately held professional managed service company. We provide guaranteed reliable web hosting, comprehensive security services, website design and powerful managed services that enable our customers to realize their business goals. Through our industry strength and expertise ISPrime leads the managed services market by providing state of the art technology with flexibility and control that guarantee the right solution at the right price for clients with any size, and clients with diverse needs. ISPrime is one of the largest Managed Service companies allowing us to provide our customers and partners unparalleled stability and reliability. ISPrime offers a 24/7/365 support via toll free telephone number, ICQ and E-mail. ISPrime offers a multi-homed network with over 95,000 Mbps transit capacity, top-notch service and 100% network uptime: this is why we have been consistently rated as the top rated managed hosting company in the industry.
Saved by uncleflo on August 27th, 2012.
I think developers and research guys who works with object recognition, image registration and other areas that uses keypoint extraction can find this post useful. Recently (from 2.4.2) a new feature descriptor algorithm was added to OpenCV library. FREAK descriptor is claimed to be superior to ORB and SURF descriptors, yet it's very fast (comparable to ORB). Also people in comments on my blog mentioned BRISK descriptor which is also new and more efficient than SURF. Well, finally i find a time to compare them and publish my research results.
Saved by uncleflo on June 24th, 2012.
The first transform I will cover is Canny Edge Detection. The book describes Sobel and Laplace operators for gradient detection, for more technical details about their function please see the text. The Canny Edge Detection algorithm takes the derivative of an image to find the gradients, then determines the direction of these gradients (vertical, horizontal, diagonal up, diagonal down). Then if the amplitude of a given gradient is high enough (the high threshold), the algorithm will trace along that gradient in its direction until the amplitude falls below the low threshold, or the gradient changes direction sharply. The algorithm will also suppress local non-maximums around the edges. cvCanny implements this algorithm. The inputs are the two images to be used, the thresholds, and the aperature size of the convolution kernal. For this example I created two sliders that adjust the thresholds, try moving the sliders and see the effect of the thresholds on the resulting edges.
Saved by uncleflo on May 19th, 2012.
These heavily armed aircraft incorporate side-firing weapons integrated with sophisticated sensor, navigation and fire control systems to provide surgical firepower or area saturation during extended loiter periods, at night and in adverse weather. The sensor suite consists of a television sensor, infrared sensor and radar. These sensors allow the gunship to visually or electronically identify friendly ground forces and targets any place, any time. The AC-130U employs synthetic apertures strike radar for long-range target detection and identification. The gunship's navigational devices include the inertial navigation systems and global positioning system. The AC-130U employs the latest technologies and can attack two targets simultaneously. It also has twice the munitions capacity of the AC-130H.
Saved by uncleflo on March 9th, 2012.
With the release of Ubuntu 9.10 (Karmic) xorg.conf was left largely redundant, at least, that was the theory. Something called EDID can be used for detecting a monitor's display capabilities, but it doesn't always work. This is usually down to monitor issues, or the video cable connected to it. If the EDID data cannot get through to the graphics adapter, then the graphics adapter knows nothing! For some reason Intel cards seem to be particularly prone to dodgy display detection, and my examples here will reflect that.
Saved by uncleflo on February 28th, 2012.
Through our sophisticated life safety, fire detection and emergency devices, people's lives and property are kept protected, helping make the world a safer place to live. We strive to improve the lifestyle of each employee, stockholder, and member of the community. Hochiki would like to introduce the HCA Conventional Fire Alarm Control Panel. The HCA series will be available in a 2, 4, or 8 zone conventional panel design. The HCA series are fully programmable using simple front panel menu options and will support releasing of agent on the 4 and 8 zone models. This panel offers programming features to the user and is a single board construction which is installer friendly. The panel will be compatible with a wide range of Hochiki America detection devices. Click here to view the HCA data sheet.
Saved by uncleflo on September 6th, 2011.
Welcome to the launch page for the VES Fire Detection Systems websites. Please select your area of interest below. Once inside navigate between sites using the "Quick Links" box on the left.
No further bookmarks found.