نتایج جستجو برای: virus detection
تعداد نتایج: 939973 فیلتر نتایج به سال:
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
background hepatitis b virus (hbv) covalently closed circular dna (cccdna) served as a vital role in the life cycle of the virus and persistent infection. however, specific and quantitative methods for cccdna detection have not been available. objectives our aim was to develop and primarily evaluate a quantitative method for hbv cccdna based on magnetic capture hybridization and quantitative pc...
Before the recent outbreaks of Zika virus, few people have ever heard of its name. Even virologists had paid little attention to this member of the Flaviviridae family. Hence, up to January 2016, only 269 articles about Zika virus had been indexed in PubMed compared to the 9187 articles related to dengue virus. However, declaration of the World health organization (WHO) about the global Zika vi...
Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper divides virus behaviors into ...
Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR...
Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR...
Background: Pseudoexfoliation syndrome is one of the most common identifiable causes of open angle glaucoma. It has unknown etiology and pathogenesis. Infection, possibly viral, is one of the proposed pathogenic mechanisms in this condition. In the present study the presence of herpes simplex virus (HSV) in specimens of anterior lens capsule of patients with pseudoexfoliation syndrome has been ...
The present study was conducted on sixty healthy female domestic ruminants that suffered from still births or abortion, to find sero-positive cases and also to determine the probable role of uterine tissue in diagnosis of akabane viral infection and viral persistency. Because of this, a serological test (ELISA) and molecular (RT-PCR) diagnostic methods were used to find the seropositive cases a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید