• No results found

call sequence as signature

LSSP PCR of Trypanosoma cruzi: how the single primer sequence affects the kDNA signature

LSSP PCR of Trypanosoma cruzi: how the single primer sequence affects the kDNA signature

... complementary sequence incorpo- rated into the amplicons during the first round of PCR, and also with low specificity but in a sequence- dependent manner to multiple sites within the amplified fragment ...

6

System To Assess Genome Sequencing Needs for Viral Protein Diagnostics and Therapeutics

System To Assess Genome Sequencing Needs for Viral Protein Diagnostics and Therapeutics

... near-neighbor sequence data in GenBank at the time of our analyses to narrow the list of protein or DNA signature ...genome sequence would have been sufficient to generate a good list of TaqMan DNA ...

11

Feasibility study of SOA based noise suppression for spectral amplitude coded OCDMA

Feasibility study of SOA based noise suppression for spectral amplitude coded OCDMA

... desired user code. A second decoder filter (Code Rx1b), which is a spatially reversed copy of Code Rx1a, is used to remove the pulse broadening introduced by the grating cascade. The frequency response of the reflection ...

8

Molecular tests for human papillomavirus (HPV), Chlamydia trachomatis and Neisseria gonorrhoeaein liquid-based cytology specimen

Molecular tests for human papillomavirus (HPV), Chlamydia trachomatis and Neisseria gonorrhoeaein liquid-based cytology specimen

... DNA sequence specific for the infectious agent with or without DNA rep- lication (amplification) by polymerase chain reaction ...a signature sequence of the target DNA and used for accurate ...

10

Testing and Analysis of Induction Motor Electrical Faults Using Current Signature Analysis

Testing and Analysis of Induction Motor Electrical Faults Using Current Signature Analysis

... Current Signature Anal- ysis (MCSA) to diagnosis the stator faults of Induction ...Current Signature Analysis (MCSA) and the Zero-Sequence Voltage Component (ZSVC) to diagnose the stator faults of ...

13

An evaluation of N gram system call 
		sequence in mobile malware detection

An evaluation of N gram system call sequence in mobile malware detection

... the signature approach and works as a cleaning up service after the mobile devices have been ...the signature based mobile malware detection only detects known malware, a new malware on the market can ...

5

Detecting Masquerade Attacks by Using a Data-Driven Semi-Global Alignment Approach

Detecting Masquerade Attacks by Using a Data-Driven Semi-Global Alignment Approach

... The main idea underlying DDSGA is to consider the best alignment of the active session sequence to the recorded sequences of the same user. After discovering the misalignment areas, we label them as anomalous and ...

6

Antimicrobial Effects of Medicinal Plants on Pathogenic Food Bacteria

Antimicrobial Effects of Medicinal Plants on Pathogenic Food Bacteria

... Molecular characterization was done using 16srRNA sequence which sequences the signature region which is specific only to the particular organisms and amplifies the sequences which can b[r] ...

7

Ddsga: Mask Data for Detecting Attack Almost Universal Approach to Harmonization

Ddsga: Mask Data for Detecting Attack Almost Universal Approach to Harmonization

... The main idea underlying DDSGA is to consider the best alignment of the active session sequence to the recorded sequences of the same user. After discovering the misalignment areas, we label them as anomalous and ...

6

Modified Counter Based Approach for Digital Watermarking of Sequential Circuits

Modified Counter Based Approach for Digital Watermarking of Sequential Circuits

... increasing signature length or by increasing count value or both as in case of counter based ...wrong sequence is ...that signature sequence was wrong and detection will ...

5

Bacillus cereus efflux protein BC3310 – a multidrug transporter of the unknown major facilitator family, UMF-2

Bacillus cereus efflux protein BC3310 – a multidrug transporter of the unknown major facilitator family, UMF-2

... MFS Signature Motif A Sequence alignment revealed that amino acid sequence motifs characteristic for MFS transporters, namely motif A, B, C, and G were conserved in BC3310 and orthologous proteins ...

13

AN INTEGRATED APPROACH FOR OFFLINE SIGNATURE CLASSIFICATION USING ANN

AN INTEGRATED APPROACH FOR OFFLINE SIGNATURE CLASSIFICATION USING ANN

... observation sequence is to be test patterned, assumptions are made that the observation sequence is produced by one of these ...observation sequence is ...

8

Design and Implementing of combinational circuits using BIST for FPGAs

Design and Implementing of combinational circuits using BIST for FPGAs

... input sequence to LFSR, the shift register will perform data compaction (or compression) on the input sequence ...input sequence the shift-register contents, Q0, Q1, and Q2, will form a pattern that ...

8

In the call centre

In the call centre

... This excerpt from the unpublished novel Dead Americans was largely produced just after the 2003 No Border camp in Frassanito, Southern Italy, at which a number of internees were successfully liberated from an Italian ...

14

Android Mobile Malware Classification using Tokenization Approach based on System Call Sequence

Android Mobile Malware Classification using Tokenization Approach based on System Call Sequence

... system call sequence patterns expected to exploit user call logs using tokenization ...system call sequence unique patterns that shows specific behavior of the malicious application ...

6

A New Way of Data Security using image coordinates as Password in AI

A New Way of Data Security using image coordinates as Password in AI

... In this module we utilize both Captcha and password in a utilizer authentication protocol, which we call Captcha-predicated Password Authentication (CbPA) protocol, to contravene online dictionary attacks. The ...

5

To Be or Not to Be: Schenker's Versus Schenkerian Attitudes Towards Sequences

To Be or Not to Be: Schenker's Versus Schenkerian Attitudes Towards Sequences

... a sequence initiates a subsidiary fifth-descent from ^2 (G–F–E–D–C) over an auxiliary cadence in the ...the sequence ascends a perfect fourth in stepwise tenths as the bass rises chromatically from E to A; ...

25

Perinatal maternal and neonatal behaviour in
the captive reticulated giraffe

Perinatal maternal and neonatal behaviour in the captive reticulated giraffe

... observations were made of the birth sequence, feeding, drinking, sleeping and one instance of an infant distress call, as well as observations of the initiation of ma[r] ...

5

Extension to UML B Notation and Toolset

Extension to UML B Notation and Toolset

... Event Call linking the start point to an object can be associated with an event just like any other, this is useful if there is an initialisation method that is called by the environment, per- haps when a program ...

89

Host Based Internal Intrusion Detection and Protection System

Host Based Internal Intrusion Detection and Protection System

... system call patterns (SC-patterns) defined as the longest system call sequence (SC-sequence) that has repeatedly appeared several times in a user’s log file for the user the IIDPS uses data ...

7

Show all 10000 documents...

Related subjects