-
221
Technical Performance of Ethiopian Male Soccer National Team
Published 2018-08-01“…Technical performance variables analysis included: Tackle, clearance Interception passes, pass accuracy, crosses, cross accuracy, corner, shot, shot accuracy and goal and players were categorized into three as defence, midfield, and striker based on their position. …”
Get full text
Article -
222
Liquid biopsies coming of age: biology, emerging technologies, and clinical translation- An introduction to the JITC expert opinion special review series on liquid biopsies
Published 2023-01-01“…Liquid biopsies are gaining momentum as minimally invasive means for cancer detection, characterization, monitoring, and interception. Composed of five expert-opinion review articles and five accompanying expert-physician viewpoints, this Journal for ImmunoTherapy of Cancer Special Review Series focuses on capturing and synthesizing the current state of science of liquid biopsies and their clinical relevance for cancer immunotherapy and beyond.…”
Get full text
Article -
223
Radiation Dynamics on Crop Productivity in Different Cropping Systems
Published 2021-01-01“…Crop productivity in any types of cropping system implemented relies primarily on the interception of photosynthetically active radiation (PAR) of crop canopy and conversion of intercepted radiation into biomass or known as radiation use efficiency (RUE). …”
Get full text
Article -
224
Yellow-Legged Hornet (suggested common name), Vespa velutina (Lepeletier 1836) (Insecta: Hymenoptera: Vespidae)
Published 2020-05-01“…Vespa velutina has not been intercepted in North America, but it is believed to have high invasion potential. …”
Get full text
Article -
225
Yellow-Legged Hornet (suggested common name), Vespa velutina (Lepeletier 1836) (Insecta: Hymenoptera: Vespidae)
Published 2020-05-01“…Vespa velutina has not been intercepted in North America, but it is believed to have high invasion potential. …”
Get full text
Article -
226
Novel blind recognition method for self-synchronized scrambler
Published 2013-01-01“…In non-cooperative communication systems,an adversary has to blindly estimate the coding parameters of scrambler from intercepted sequence.On the condition biased information source,a new method was proposed which can blindly recover the generating polynomial of self-synchronized scrambler.This method was based on the corrected squared Euclidean distance which was used to measure the distance between the actual stat ical probability and the uniform distribution.The simulation results verify the theory analysis and the validity of the algorithm.…”
Get full text
Article -
227
Gender disparities in application and admission to the medical residency program in Peru: A cross sectional study from 2016 to 2023.
Published 2025-01-01“…Bayesian multilevel linear models were employed, incorporating random intercepts and slopes by specialty to account for variability across specialties. …”
Get full text
Article -
228
Oriental Fruit Fly, Bactrocera dorsalis (Hendel) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…It is established in numerous areas in Asia, and is often intercepted in the United States, sometimes establishing infestations that were previously eradicated. …”
Get full text
Article -
229
Adaptive Integrated Guidance and Fault Tolerant Control Using Backstepping and Sliding Mode
Published 2015-01-01“…A control law using combination of adaptive backstepping and sliding mode approaches is designed to achieve interception in the presence of bounded uncertainties and actuator fault. …”
Get full text
Article -
230
An Oriental Wood Borer, Heterobostrychus aequalis (Waterhouse) (Insecta: Coleoptera: Bostrichidae)
Published 2007-03-01“…Fasulo, describes this serious pest of lumber and stored wood products which has been found and intercepted at Florida ports, and is now established in the wild. …”
Get full text
Article -
231
Oriental Fruit Fly, Bactrocera dorsalis (Hendel) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…It is established in numerous areas in Asia, and is often intercepted in the United States, sometimes establishing infestations that were previously eradicated. …”
Get full text
Article -
232
Study on authority watermark of the electronic chart based on the semantics characteristics
Published 2016-11-01“…In order to expand the function of watermarking technology, a concept of authority watermark, for which, wa-termarks defining the users' specific operations on the digital carriers was proposed. With interception technology on im-ages, the constructed authority watermark based on the semantics characteristics of the watermark images, through the interpretation of the watermarks, accessing behaviors on the electronic chart would be controlled. …”
Get full text
Article -
233
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01“…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
Get full text
Article -
234
An Oriental Wood Borer, Heterobostrychus aequalis (Waterhouse) (Insecta: Coleoptera: Bostrichidae)
Published 2007-03-01“…Fasulo, describes this serious pest of lumber and stored wood products which has been found and intercepted at Florida ports, and is now established in the wild. …”
Get full text
Article -
235
Slugs (of Florida) (Gastropoda: Pulmonata)
Published 2005-06-01“…Eleven species of exotic slugs have been intercepted by USDA and DPI quarantine inspectors, but only one is known to be established. …”
Get full text
Article -
236
Slugs (of Florida) (Gastropoda: Pulmonata)
Published 2005-06-01“…Eleven species of exotic slugs have been intercepted by USDA and DPI quarantine inspectors, but only one is known to be established. …”
Get full text
Article -
237
Modal Test and Analysis of the Engine,Gearbox and Frame of a Light Truck
Published 2017-01-01“…The modal of engine,gearbox and frame are tested by the method of hammer excitation,and the modal parameters are obtained. Through interception the vibration signals when the empty light truck on washboard road and obstacles road,the modal test analysis of the vibration signal is carried out,the modal parameters of different stages of the light truck in the working environment are obtained. …”
Get full text
Article -
238
The Threat from European Missile Defence System to Russian National Security
Published 2014-02-01“…The possibility of intercepting long-range missiles is postponed to the third (2018) and forth phases (2020). …”
Get full text
Article -
239
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Published 2022-02-01“…Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack rate, and periodicity.Existing detection methods have the problems of single detection type and low identification accuracy.In order to solve them, a multi-type low-rate DDoS attack detection method based on hybrid deep learning was proposed.Different types of low-rate DDoS attacks and normal traffic in different scenarios under 5G environment were simulated.Traffic was collected at the network entrance and its traffic characteristic information was extracted to obtain multiple types of low-rate DDoS attack data sets.From the perspective of statistical threshold and feature engineering, the characteristics of different types of low-rate DDoS attacks were analyzed respectively, and the effective feature set of 40-dimension low-rate DDoS attacks was obtained.CNN-RF hybrid deep learning algorithm was used for offline training based on the effective feature set, and the performance of this algorithm was compared with LSTM-Light GBM and LSTM-RF algorithms.The CNN-RF detection model was deployed on the gateway to realize the online detection of multiple types of low-rate DDoS attacks, and the performance was evaluated by using the newly defined error interception rate and malicious traffic detection rate indexes.The results show that the proposed method can detect four types of low-rate DDoS attacks online, including Slow Headers attack, Slow Body attack, Slow Read attack and Shrew attack, and the error interception rate reaches 11.03% in 120 s time window.The detection rate of malicious traffic reaches 96.22%.It can be judged by the results that the proposed method can significantly reduce the intensity of low-rate DDoS attack traffic at the network entrance, and can be deployed and applied in the actual environment.…”
Get full text
Article -
240
Mandibular Symmetrical Bilateral Canine-Lateral Incisors Transposition: Its Early Diagnosis and Treatment Considerations
Published 2016-01-01“…Early diagnosis and interceptive intervention may reduce the risk of possible transposition between the mandibular canine and lateral incisor. …”
Get full text
Article