نتایج جستجو برای: qualitative detection

تعداد نتایج: 761826  

Journal: :Briefings in bioinformatics 2012
Julien Dutheil

Positions in a molecule that share a common constraint do not evolve independently, and therefore leave a signature in the patterns of homologous sequences. Exhibiting such positions with a coevolution pattern from a sequence alignment has great potential for predicting functional and structural properties of molecules through comparative analysis. This task is complicated by the existence of a...

2014
Priya Dosodia Amarjeet Poonia

Recently the facial expression recognition has gained broad concentration and fast progress. In this paper, we give a review for the latest advancement of the domestic and international facial gesture recognition technology. Facial Expression Recognition system includes three steps: face detection, expressional feature extraction and expression classification. We concentrate on the method featu...

2000
James Cannady Jay Harrell

Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an analysis of the progress being made in the development of effective intrusion detection systems for computer systems and distributed computer networks. The technologies which are discussed are designed to detect instances of the access of computer systems by unauthoriz...

2012
Maximiliano Sosa Andrés Peter Nunnenkamp Matthias Busse

Non-traditional source countries of FDI play an increasingly important role, notably in developing host countries. This raises the question of whether the location choices differ systematically between traditional and non-traditional source countries. We perform Logit and Poisson Pseudo Maximum Likelihood estimations to assess the determinants of bilateral FDI flows. We find that economic geogr...

2011
Manish Shrivastava Shubha Mishra

One of the recent advances throughout this decade has been the evolution of various intrusion detection modes and the way they are used. Since a lot of work has already been done and there is still much more to do, we are focusing here on what we have currently in this area, particularly the techniques and a comparative study to highlight the prominent features to provide support for computer n...

2004
APOSTOLOS LEROS

In this paper a new approach for increasing the efficiency of checksum error detection is proposed. In order to decrease the probability of undetected errors, it is suggested to use Avalanche transformation of codes before the checksum calculation. Analytical estimations of undetected error probabilities are presented. Comparative analysis indicated high effectiveness of the suggested approach....

2011
M. González-Hidalgo S. Massanet

In this paper a comparative analysis of different techniques in order to transform a gray-scale edge image to a thin binary edge image is performed. Several thresholding methods and thinning methods are compared. The comparison is made according to some performance measures, such as Pratt’s figure of merit, Baddeley’s measure and the ρ-coefficient. This study is an essential intermediate step t...

Detection of genetically modified organisms (GMOs) in food is an important issue for all the subjects involved in food control and customer’s right. Due to the increasing number of GMOs imported to Iran during the past few years, it has become necessary to screen the products in order to determine the identity of the consumed daily foodstuffs. In this study, following extraction of genomic DNA ...

Journal: :The Southeast Asian journal of tropical medicine and public health 2004
Wasun Chantratita Wiroj Pongtanapisit Wantanich Piroj Chutatip Srichunrasmi Somying Seesuai

The aim of this study was to develop a rapid, sensitive and robust procedure for the qualitative detection of SARS coronavirus RNA. Three unique detection formats were developed for real-time RNA amplification assays: a post amplification detection step with a virus-specific internal capture probe based on Taqman (RT-PCR TaqMan assay), hybridization probe (RT-PCR hybridization probe assay) and ...

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید