
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 17 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile work user process database share manage hardware professional buy industry internet dance advice installation developer 3d search camera access material customer travel test standard review documentation css money engineering webdesign engine develop device photography digital api speed source program management phone discussion question event client story simple water marketing yacht app content setup package fast idea interface account communication cheap compare script study market easy live google resource operation startup monitor training
Tag selected: detection.
Looking up detection tag. Showing 17 results. Clear
Saved by uncleflo on February 12th, 2022.
Ever asked yourself "Where can't I fly my drone in the UK?" or "What does a Flight Restriction Zone mean?" NoFlyDrones.co.uk can help. Your free, easy to use tool showing no fly zones in the UK. We use the rules and regulations of the UK Air Navigation Order (CAP393) to present a simple graphical tool to aid safe flight planning for hobbyists and professional drone operators alike. Danger Areas are areas of military airspace often used for activities such as fighter pilot training, live ammunition training or weapons and systems testing (including GPS jamming exercises). The official definition is “An airspace of defined dimensions within which activities dangerous to the flight of aircraft may exist at specified time”. HIRTA’s are High Intensity Radio Transmission Areas and flying through these areas could interfere with the electronics on board your drone. Prohibited Areas are areas of airspace which for one reason or another have been prohibited from having aircraft enter them. The official definition is “An airspace of defined dimensions above the land areas or territorial waters of a State within which the flight of aircraft is prohibited” You will have to investigate the NATS AIP for more information about why the area is prohibited.
drone airspace aerodrome bounds map unmanned restriction forbid jamming font geometry marker export comment zoom prohibit remote browser flight assign protect privacy interfere dimension check arrange fly detection safety training military danger activity hobby gps area electronic show tool plan
Saved by uncleflo on January 14th, 2022.
QVerity is a provider of behavioral analysis and screening services for private- and public-sector clients worldwide. Founded and staffed by former Central Intelligence Agency experts in deception detection and critical interviewing techniques, QVerity uses proven information-gathering methodologies, developed within the U.S. intelligence community, for commercial applications. Our services yield an exclusive level of analysis that enables competitive advantage and high-value insight for organizational and individual benefit. QVerity is privately held and is headquartered in Greenville, N.C.
deceptive deception detection behaviour insight organizational teach provider manual learn analysis advantage course product service information gather screen intelligence agency expert critical technique application benefit online company
Saved by uncleflo on April 10th, 2021.
 A global network of support experts available 24x7. We offer simple and flexible support programs to maximize the value of your FireEye products and services. The new standard in threat intelligence. Access for our registered Partners to help you be successful with FireEye.
Collateral, deal registration, request for funds, training, enablement, and more. Read our digital magazine providing expert-authored stories, information, unique insights, and advice on cyber security. 
comprehensive enable alert api hacker threat attack vulnerability privacy intelligence global financial motivate emerge documentation incident detection advantage information lookup understand insight value product service flexible support program maximize
Saved by uncleflo on December 22nd, 2019.
Super 800A-1200A 28S high powerful Brushless controller ESC For Car electric motorcycle or Air. Latest design for more efficient water cooling structure. The firmware is upgraded recently. Two way communication while connecting it with computer. Motor wire can be checked while connecting the power battery. Simply set function value by programming box or by PC via USB cable. Li-MH/Li-Po,Ne-Cd/Ne-mH,LiFe battery can be used. Enables settings the voltage per cell for the point at which the controller's cut off circuitry engages,Li-MH/Li-Po from 2.0-3.6,Ne-Cd/Ne-4-1.0V.LiFe from 2.2-2.8V. Reverse function,the delay time of reverse is adjustable. The power of the motor forward/reverse can be set. Automatically detection the throttle route or can be set a fixed number by manual operation. Auto cut off the power within 3 seconds if no radio signs. Timing setting may be adjusted(0-30) to suit the motor type.
brushless controller esc electric motorcycle car air efficient watercooled structure firmware communication computer motor wire battery programming usb voltage controller reverse detection throttle manual operation engine electronics transport
Saved by uncleflo on January 6th, 2019.
This new standard defines three test charts. The new Imatest eSFR ISO module performs a highly automated analysis of the new low contrast (4:1) Edge SFR chart and is available in Imatest Master and Image Sensor 4.0. This chart does not work with the highly automated Imatest eSFR ISO module, described below. For highly automated measurements (including squares near the corners, color patches, and wedges) we recommend one of the Imatest eSFR ISO charts shown below. These charts are fully compliant with ISO 12233:2017. Supported by the Imatest Star Chart module. Optional automatic region detection is available when used with a star pattern that has registration marks on the sides of the image.
sharpness glare sharp wedge automate reflective square module finer diagonal compliant photographic frame conform chart detection recommend enhanced aspect horizontal image requirement compliance corners edge vertical angle contrast test testing photography camera lens iso analysis registration video resolution compare
Saved by uncleflo on June 30th, 2017.
The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.
ethical hacker academy intruder course howto learn secure detection popular demand privilege engineer policy create virus plan conduct assessment penetrate vulnerable center
Saved by uncleflo on December 7th, 2014.
Hallo, Im working on the collision detection part of my program and have it partially working. Right now it works in some cases, but fails in other A triangle made like this works.
raytracer study detection program development solution guide discussion forum triangle case physics game intersection code ray work collision partial suggestion howto cpp c++ compile math advice community
Saved by uncleflo on November 14th, 2014.
Redscan enables businesses to manage their IT security risks by providing a subscription service that combines the people, process, technology, and intelligence needed to proactively identify and manage threats and breaches. The IT security challenge facing most businesses today is that cyber-attacks are increasingly advanced and too easily evade traditional signature-based defences such as next generation firewall, IPS and anti-virus. Organisations need to be able to identify and stop these attacks quickly before they cause significant damage. However, the time, resource, and cost to do this effectively is too high.
red scan business it security risk provide secure network threat detection client industry design size experience guide device manage event report forensic install operation centre deliver technology intelligence advanced subscribe service attack preventative prevent account law study certification deploy reduce mountain data incident
Saved by uncleflo on September 2nd, 2014.
Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion. Read more at http://junkee.com/google-maps-has-been-tracking-your-every-move-and-theres-a-website-to-prove-it/39639#LcAcPVvVY28uzmSR.99
story google location track move website map data transparancy central database detection scan sensor gps phone show demonstrate useful interesting world article privacy breach challenge nerd technical
Saved by uncleflo on September 12th, 2013.
This article shows how to install and configure mod_security. mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc. In the first chapter I will show how to install mod_security on Debian Sarge, Ubuntu 6.06 LTS (Dapper Drake), and on Fedora Core 5, and in the second chapter I will describe how to configure Apache for mod_security which is independent from the distribution you're using. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!
system secure apache module security linux howto guide tutorial configuration setup detection prevention attack sql injection shield intrusion
Saved by uncleflo on May 17th, 2013.
ISPrime is a privately held professional managed service company. We provide guaranteed reliable web hosting, comprehensive security services, website design and powerful managed services that enable our customers to realize their business goals. Through our industry strength and expertise ISPrime leads the managed services market by providing state of the art technology with flexibility and control that guarantee the right solution at the right price for clients with any size, and clients with diverse needs. ISPrime is one of the largest Managed Service companies allowing us to provide our customers and partners unparalleled stability and reliability. ISPrime offers a 24/7/365 support via toll free telephone number, ICQ and E-mail. ISPrime offers a multi-homed network with over 95,000 Mbps transit capacity, top-notch service and 100% network uptime: this is why we have been consistently rated as the top rated managed hosting company in the industry.
isprime network center data support server hosting bandwidth realtime monitor detection security surveillance managed service encoding
Saved by uncleflo on August 27th, 2012.
I think developers and research guys who works with object recognition, image registration and other areas that uses keypoint extraction can find this post useful. Recently (from 2.4.2) a new feature descriptor algorithm was added to OpenCV library. FREAK descriptor is claimed to be superior to ORB and SURF descriptors, yet it's very fast (comparable to ORB). Also people in comments on my blog mentioned BRISK descriptor which is also new and more efficient than SURF. Well, finally i find a time to compare them and publish my research results.
tui cool articles algorithms feature detection object recognition keypoint extraction descriptor speed efficient
Saved by uncleflo on June 24th, 2012.
The first transform I will cover is Canny Edge Detection. The book describes Sobel and Laplace operators for gradient detection, for more technical details about their function please see the text. The Canny Edge Detection algorithm takes the derivative of an image to find the gradients, then determines the direction of these gradients (vertical, horizontal, diagonal up, diagonal down). Then if the amplitude of a given gradient is high enough (the high threshold), the algorithm will trace along that gradient in its direction until the amplitude falls below the low threshold, or the gradient changes direction sharply. The algorithm will also suppress local non-maximums around the edges. cvCanny implements this algorithm. The inputs are the two images to be used, the thresholds, and the aperature size of the convolution kernal. For this example I created two sliders that adjust the thresholds, try moving the sliders and see the effect of the thresholds on the resulting edges.
opencv solution canny algorithm detection technical edge gradient function user image
Saved by uncleflo on May 19th, 2012.
These heavily armed aircraft incorporate side-firing weapons integrated with sophisticated sensor, navigation and fire control systems to provide surgical firepower or area saturation during extended loiter periods, at night and in adverse weather. The sensor suite consists of a television sensor, infrared sensor and radar. These sensors allow the gunship to visually or electronically identify friendly ground forces and targets any place, any time. The AC-130U employs synthetic apertures strike radar for long-range target detection and identification. The gunship's navigational devices include the inertial navigation systems and global positioning system. The AC-130U employs the latest technologies and can attack two targets simultaneously. It also has twice the munitions capacity of the AC-130H.
military aviation target detection airplane gunship gun ship heavy support information
Saved by uncleflo on March 9th, 2012.
With the release of Ubuntu 9.10 (Karmic) xorg.conf was left largely redundant, at least, that was the theory. Something called EDID can be used for detecting a monitor's display capabilities, but it doesn't always work. This is usually down to monitor issues, or the video cable connected to it. If the EDID data cannot get through to the graphics adapter, then the graphics adapter knows nothing! For some reason Intel cards seem to be particularly prone to dodgy display detection, and my examples here will reflect that.
config xorg resolution detection intel adapter edid hardware screen crt monitor linux blog information commands bash
Saved by uncleflo on February 28th, 2012.
Through our sophisticated life safety, fire detection and emergency devices, people's lives and property are kept protected, helping make the world a safer place to live. We strive to improve the lifestyle of each employee, stockholder, and member of the community. Hochiki would like to introduce the HCA Conventional Fire Alarm Control Panel. The HCA series will be available in a 2, 4, or 8 zone conventional panel design. The HCA series are fully programmable using simple front panel menu options and will support releasing of agent on the 4 and 8 zone models. This panel offers programming features to the user and is a single board construction which is installer friendly. The panel will be compatible with a wide range of Hochiki America detection devices. Click here to view the HCA data sheet.
control board panel hca device loop actuator detector sensor systems detection corporation america hochiki detect fire
Saved by uncleflo on September 6th, 2011.
Welcome to the launch page for the VES Fire Detection Systems websites. Please select your area of interest below. Once inside navigate between sites using the "Quick Links" box on the left.
ves kentec system home website company information services products business fire detection
No further bookmarks found.