نتایج جستجو برای: apt

تعداد نتایج: 3909  

Journal: :Sexually transmitted infections 2012
Claudia Estcourt Lorna Sutcliffe Jackie Cassell Catherine H Mercer Andrew Copas Laura James Nicola Low Patrick Horner Michael Clarke Merle Symonds Tracy Roberts Angelos Tsourapas Anne M Johnson

OBJECTIVES To develop two new models of expedited partner therapy for the UK, and evaluate them for feasibility, acceptability and preliminary outcome estimates to inform the design of a randomised controlled trial (RCT). METHODS Two models of expedited partner therapy (APTHotline and APTPharmacy), known as 'Accelerated Partner Therapy' (APT) were developed. A non-randomised comparative study...

2011
Qin Wang Jie Wu Wenbo Wang Aiqin Wang

A series of chitosan/attapulgite (CTS/APT) hybrid microspheres were prepared by a facile spray-drying technique. The developed hybrid microspheres were characterized by Fourier transform infrared spectra (FTIR), X-ray powder diffraction (XRD), scanning electron microscopy (SEM) and the zeta potential. The encapsulation efficiency and in vitro controlled release properties of the microspheres fo...

Journal: :Logical Methods in Computer Science 2009
Naoki Kobayashi C.-H. Luke Ong

Ong has shown that the modal mu-calculus model checking problem (equivalently, the alternating parity tree automaton (APT) acceptance problem) of possibly-infinite ranked trees generated by order-n recursion schemes is n-EXPTIME complete. We consider two subclasses of APT and investigate the complexity of the respective acceptance problems. The main results are that, for APT with a single prior...

Journal: :Alimentary Pharmacology & Therapeutics 2021

LINKED CONTENT This article is linked to Khanna & Camilleri and Tobi et al papers. To view these articles, visit https://doi.org/10.1111/apt.16143 https://doi.org/10.1111/apt.16270

Journal: :Alimentary Pharmacology & Therapeutics 2021

LINKED CONTENT This article is linked to Brakenhoff et al and Thibault & Asselah papers. To view these articles, visit https://doi.org/10.1111/apt.16172 https://doi.org/10.1111/apt.16214

2016
Akademia Baru S. C. Y. Ng M. Bakhtiari

Abstract – Advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and remain undetected for as long as they can. The intention of an APT attack is to steal data and eavesdropping rather than to cause damage to the network or organization. The problem of APT is the techniques used are stealth oriented and detection of APT attack has been di...

2008
Alexander P. Bakulev

We give a short introduction to the Analytic Perturbation Theory (APT) [1, 2, 3, 4, 5] in QCD, describe its problems and suggest as a tool for their resolution the Fractional APT (FAPT) [6, 7, 8, 9]. We also describe shortly how to treat heavy-quark thresholds in FAPT. As an applications of this technique we discuss (i) the pion form factor calculation in the Euclidean FAPT and (ii) the Higgs b...

2011
Cristian Molinaro Amy Sliva V. S. Subrahmanian

Annotated Probabilistic Temporal (APT) logic programs are a form of logic programs that allow users to state (or systems to automatically learn) rules of the form “formula G becomes true K time units after formula F became true with L to U% probability.” In this paper, we develop a theory of abduction for APT logic programs. Specifically, given an APT logic program Π, a set of formulas H that c...

1999
John W. McDonough William J. Byrne

In recent work, the all-pass transform (APT) was proposed as the basis of a speaker adaptation scheme intended for use with a large vocabulary speech recognition system. It was shown that APT-based adaptation reduces to a linear transformation of cepstral means, much like the better known maximum likelihood linear regression (MLLR), but is specified by far fewer free parameters. Due to its line...

2017
Ishai Rosenberg Guillaume Sicard Eli David

In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furtherm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید