نتایج جستجو برای: ease of detection

تعداد نتایج: 21214140  

Journal: :journal of current ophthalmology 0
آرمان زرگران arman zargaran علیرضا مهدیزاده alireza mehdizadeh عبدالعلی محقق زاده abdolali mohagheghzadeh

cataract has a long history and was known about 2500 bc in egypt. in the medieval times, physicians and surgeons used surgical approaches to ease cataract (āb morvārid). albucasis, as a great spanish muslim surgeon (936-1013 ad) has a detailed and accurate description of cataract surgery procedure and patient care in his manuscript, al tasreef. his description can show surgical development to e...

Journal: :Journal of microbiological methods 2010
Alina Deshpande Jason Gans Steven W Graves Lance Green Laura Taylor Heung Bok Kim Yuliya A Kunde Pascale M Leonard Po-E Li Jacob Mark Jian Song Momchilo Vuyisich P Scott White

We have developed a rapid (under 4 hours), multiplex, nucleic acid assay, adapted to a microsphere array detection platform. We call this assay multiplex oligonucleotide ligation-PCR (MOL-PCR). Unlike other ligation-based assays that require multiple steps, our protocol consists of a single tube reaction, followed by hybridization to a Luminex microsphere array for detection. We demonstrate the...

Journal: :Appl. Soft Comput. 2014
Neda Soltani Halvaiee Mohammad Kazem Akbari

The amount of online transactions is growing these days to a large number. A big portion of these transactions contains credit card transactions. The growth of online fraud, on the other hand, is notable, which is generally a result of ease of access to edge technology for everyone. There has been research done on many models and methods for credit card fraud prevention and detection. Artificia...

2008
Maheyzah Md. Siraj Siti Zaiton Mohd. Hashim

In response to proliferated attacks on enterprise systems today, practitioners employ multiple, diverse intrusion detection sensors to improve the detection rate and the coverage within the system for increased information assurance. An important problem in such environment is the management of alerts. One of the essential issues in alerts management is the standardization of the alerts format....

Fatemeh Shahryari Masoud Shams-Bakhsh Mohammad Reza Safarnejad Naser Safaie, Saeed Ataei Kachoiee

Background: The witches’ broom disease of lime caused by <span style="font-variant: normal; font-style: normal; font-family: Capitolium...

2005
Chi Xie

The purpose of this report is to assess the strengths and limitations of available sensor technologies and their corresponding processing algorithms. The performance of an incident detection system is determined on two levels: data collection technologies and data processing algorithms. Variations in sensor-and-algorithm schemes result in a variety of solutions for incident detection. In this r...

1998
Albert J. Höglund Kimmo Hätönen

Computer systems are vulnerable to abuse by insiders and to penetration by outsiders. The amount of monitoring data generated in computer networks is enormous. Tools are needed to ease the work of system operators. Anomaly detection attempts to recognise abnormal behaviour to detect intrusions. A prototype Anomaly Detection System has been constructed. The system provides means for automatic an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید