نتایج جستجو برای: ease of detection
تعداد نتایج: 21214140 فیلتر نتایج به سال:
cataract has a long history and was known about 2500 bc in egypt. in the medieval times, physicians and surgeons used surgical approaches to ease cataract (āb morvārid). albucasis, as a great spanish muslim surgeon (936-1013 ad) has a detailed and accurate description of cataract surgery procedure and patient care in his manuscript, al tasreef. his description can show surgical development to e...
We have developed a rapid (under 4 hours), multiplex, nucleic acid assay, adapted to a microsphere array detection platform. We call this assay multiplex oligonucleotide ligation-PCR (MOL-PCR). Unlike other ligation-based assays that require multiple steps, our protocol consists of a single tube reaction, followed by hybridization to a Luminex microsphere array for detection. We demonstrate the...
The amount of online transactions is growing these days to a large number. A big portion of these transactions contains credit card transactions. The growth of online fraud, on the other hand, is notable, which is generally a result of ease of access to edge technology for everyone. There has been research done on many models and methods for credit card fraud prevention and detection. Artificia...
In response to proliferated attacks on enterprise systems today, practitioners employ multiple, diverse intrusion detection sensors to improve the detection rate and the coverage within the system for increased information assurance. An important problem in such environment is the management of alerts. One of the essential issues in alerts management is the standardization of the alerts format....
Background: The witches’ broom disease of lime caused by <span style="font-variant: normal; font-style: normal; font-family: Capitolium...
The purpose of this report is to assess the strengths and limitations of available sensor technologies and their corresponding processing algorithms. The performance of an incident detection system is determined on two levels: data collection technologies and data processing algorithms. Variations in sensor-and-algorithm schemes result in a variety of solutions for incident detection. In this r...
Computer systems are vulnerable to abuse by insiders and to penetration by outsiders. The amount of monitoring data generated in computer networks is enormous. Tools are needed to ease the work of system operators. Anomaly detection attempts to recognise abnormal behaviour to detect intrusions. A prototype Anomaly Detection System has been constructed. The system provides means for automatic an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید