نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

2012
Ok Jeong Lee Su-Jin Kim Young Bae Sohn Hyung-Doo Park Soo-Youn Lee Chi-Hwa Kim Ah-Ra Ko Yeon-Joo Yook Su-Jin Lee Sung Won Park Se-Hwa Kim Sung-Yoon Cho Eun-Kyung Kwon Sun Ju Han Dong-Kyu Jin

PURPOSE Mucopolysaccharidosis type II (MPS II or Hunter syndrome) is a rare lysosomal storage disorder caused by iduronate-2-sulfatase (IDS) deficiency. MPS II causes a wide phenotypic spectrum of symptoms ranging from mild to severe. IDS activity, which is measured in leukocyte pellets or fibroblasts, was reported to be related to clinical phenotype by Sukegawa-Hayasaka et al. Measurement of r...

Journal: :Neuropsychiatric Disease and Treatment 2006
Ira H Bernstein A John Rush Thomas J Carmody Ada Woo Madhukar H Trivedi

BACKGROUND: Both the clinician (IDS-C(30)) and self-report (IDS-SR(30)) versions of the 30-item Inventory of Depressive Symptomatology have acceptable psychiatric properties and have been used in various clinical studies. These two scales, however, have not been compared using item response theory (IRT) methods to determine whether the standard scoring methods are optimal. METHODS: Data were de...

Journal: :Information Systems Research 2005
Huseyin Cavusoglu Birendra K. Mishra Srinivasan Raghunathan

T increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of the...

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

2014
HICHAM TOUMI AHMED EDDAOUI MOHAMED TALEA

Cloud computing improves collaboration, flexibility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows the use of a collection of services, applications, information, and infrastructure composed of group of compute, network, information, and storage resources. In brief, the Cloud Computing is undergoing an ...

Journal: :McGill Journal of Medicine : MJM 2009
Sudesh Gyawali P Ravi Shankar Archana Saha Lalit Mohan

Unnecessary, excessive and poor injection practices in the South East Asia region (including Nepal) have been observed previously. The authors aim to study prescription of injectable drugs to inpatients in a teaching hospital in Western Nepal. Prescription of injectable drugs (IDs) and intravenous fluids (IVFs) to inpatients discharged from the wards of the Manipal Teaching Hospital during 1st ...

Journal: :Human molecular genetics 1997
K M Timms M L Bondeson M A Ansari-Lari K Lagerstedt D M Muzny S P Dugan-Rocha D L Nelson U Pettersson R A Gibbs

Severe Hunter syndrome is a fatal X-linked lysosomal storage disorder caused by iduronate-2-sulphatase (IDS) deficiency. Patients with complete deletion of the IDS locus often have atypical phenotypes including ptosis, obstructive sleep apnoea, and the occurrence of seizures. We have used genomic DNA sequencing to identify several new genes in the IDS region. DNA deletion patients with atypical...

Journal: :Cancer research 1990
K E Hellström D E Yelton H P Fell D Beaton M Gayle M MacLean M Kahn I Hellström

Mouse monoclonal anti-idiotypic antibodies (anti-ids) were raised against L6, a murine IgG2a monoclonal antibody specific for a cell surface antigen expressed by many human carcinomas. Ten distinct anti-ids were generated. Eight anti-ids were shown to inhibit the binding of L6 to its target antigen and were characterized in detail. The heavy and light chain variable region gene segments of the ...

2015
Nattawat Khamphakdee Nunnapus Benjamas Saiyan Saiyod

The intrusion detection system (IDS) is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS can detect only known attacks. Therefore, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید