نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

Journal: :American journal of physiology. Endocrinology and metabolism 2004
I Coronado-Pons A Novials S Casas A Clark R Gomis

The lysosomal enzyme iduronate-2-sulfatase (IDS) is expressed in pancreatic islets and is responsible for degradation of proteoglycans, such as perlecan and dermatan sulfate. To determine the role of IDS in islets, expression and regulation of the gene and localization of the enzyme were investigated in mouse pancreatic islets and clonal cells. The Ids gene was expressed in mouse islets and bet...

Journal: :Research in developmental disabilities 2010
Peter E Langdon Isabel C H Clare Glynis H Murphy

BACKGROUND Social desirability has been construed as either inaccurately attributing positive characteristics to oneself (self-deception), or inaccurately denying that one possesses undesirable characteristics to others (other-deception or impression management). These conceptualisations of social desirability have not been considered in relation to people with intellectual disabilities (IDs), ...

2009
Saidat Adebukola Onashoga Adebayo D. Akinde Adesina Simon Sodiya

Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clea...

2010
S. G. Bhirud Vijay Katkar

Tremendous efforts have been taken over many years to secure the network against attacks; still attackers are successful with painful frequency. Experienced attackers try to disable the Intrusion Detection System (IDS) before launching attack. Therefore there should be some mechanism in IDS for uninterrupted detection of intrusion even though failure in IDS has occurred due to attacks. This pap...

2016
Nilofer Shoaib Khan Umesh Lilhore

In the field of Information technology security plays a vital role. Unauthorized entries or any anomalies in system are known as intrusion and detection of these anomalies are known as Intrusion Detection System (IDS). As the attacks have increased in huge numbers over the past few years, IDS is increasingly becoming a critical component to secure the network. Designing of an efficient Intrusio...

2015
Bogdan Ludusan Amanda Seidl Emmanuel Dupoux Alejandrina Cristia

Infant-directed speech (IDS) is thought to play a key role in determining infant language acquisition. It is thus important to describe how computational models of infant language acquisition behave when given an input of IDS, as compared to adult-directed speech (ADS). In this paper, we explore how an acoustic motif discovery algorithm fares when presented with speech from both registers. Resu...

Journal: :Clinical and diagnostic laboratory immunology 1994
W Xue H C Minocha

We have previously prepared rabbit anti-idiotypic antibodies (anti-Ids) against the neutralizing monoclonal antibodies (MAbs) specific for the gp53 of bovine viral diarrhea virus (BVDV). The anti-Ids, purified by sequential immunoaffinity chromatography, inhibited the immunizing MAb from binding to the original antigens and blocked BVDV infection of cell cultures. This study evaluated immune re...

Journal: :Homeopathy : the journal of the Faculty of Homeopathy 2013
S Farrer E S Baitson L Gedah C Norman P Darby R T Mathie

INTRODUCTION This investigation extends our previous dental data collection pilot study with the following main aims: to gain insight into the periodontal complaints that dentists in the UK treat using individualised homeopathic prescription; to record patient-assessed change in severity of treated complaint (acute or chronic); to determine periodontal pocket depth (PPD). MATERIALS AND METHOD...

2014
Chaminda Alocious Nasser Abouzakhar Hannan Xiao Bruce Christianson

Computer Network Security has become a critical and important issue due to ever increasing cybercrimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security agencies and other militarily related organizations are highly concerned about the confidentiality and access control of the stored data. Therefore, it is really important to i...

2012
Rafael Páez

Intrusion Detection Systems (IDS) are software or hardware products that automate the analysis process of traffic on a network or a host. and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. Accordingly to its location, the IDS must be parameterized in a different way, for e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید