نتایج جستجو برای: profiling
تعداد نتایج: 83846 فیلتر نتایج به سال:
Security vulnerabilities are often due to latent software defects, which can be exploited by a malicious attacker. For example, a buffer overflow vulnerability can derive from a program’s failure to check the size of its input. Security vulnerabilities are often present in complex software after deployment, and these defects must be identified early so as to minimize the damages that attackers ...
Caspian Sea with an average depth of 27m is the largest enclosed water body in the world. Despite its enormity and valuable biotic and economic resources, investigations on the biota and seawater properties are mosaic at best. In previous studies, the monitoring of the chlorophyll-a concentrations in the Southern Caspian Sea was organized based on satellite data sets however, vertical dis...
OBJECTIVE To consider the use of systematic methods for categorising foods according to their nutritional quality ('nutrient profiling') as a strategy for promoting public health through better dietary choices. METHODS We describe and discuss several well-developed approaches for categorising foods using nutrient profiling, primarily in the area of food labelling and also with respect to adve...
Proteins are important targets in cancer research because malignancy is associated with defects in cell protein machinery. Protein profiling is an emerging independent subspecialty of proteomics that is rapidly expanding and providing unprecedented insight into biological events. Quantitative assessment of protein levels in hematologic malignancies seeks a comprehensive understanding of leukemi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید