Showing 221 - 240 results of 408 for search '"The Intercept"', query time: 0.05s Refine Results
  1. 221

    Technical Performance of Ethiopian Male Soccer National Team by Esayas Zenbaba

    Published 2018-08-01
    “…Technical performance variables analysis included: Tackle, clearance Interception passes, pass accuracy, crosses, cross accuracy, corner, shot, shot accuracy and goal and players were categorized into three as defence, midfield, and striker based on their position. …”
    Get full text
    Article
  2. 222

    Liquid biopsies coming of age: biology, emerging technologies, and clinical translation- An introduction to the JITC expert opinion special review series on liquid biopsies by Valsamo Anagnostou, Mark D. Stewart

    Published 2023-01-01
    “…Liquid biopsies are gaining momentum as minimally invasive means for cancer detection, characterization, monitoring, and interception. Composed of five expert-opinion review articles and five accompanying expert-physician viewpoints, this Journal for ImmunoTherapy of Cancer Special Review Series focuses on capturing and synthesizing the current state of science of liquid biopsies and their clinical relevance for cancer immunotherapy and beyond.…”
    Get full text
    Article
  3. 223

    Radiation Dynamics on Crop Productivity in Different Cropping Systems by I. Nur Arina, M. Y. Martini, S. Surdiana, R. Mohd Fauzi, S. Zulkefly

    Published 2021-01-01
    “…Crop productivity in any types of cropping system implemented relies primarily on the interception of photosynthetically active radiation (PAR) of crop canopy and conversion of intercepted radiation into biomass or known as radiation use efficiency (RUE). …”
    Get full text
    Article
  4. 224

    Yellow-Legged Hornet (suggested common name), Vespa velutina (Lepeletier 1836) (Insecta: Hymenoptera: Vespidae) by Krystal Ashman, Oliver Keller, Cameron Jack

    Published 2020-05-01
    “…Vespa velutina has not been intercepted in North America, but it is believed to have high invasion potential. …”
    Get full text
    Article
  5. 225

    Yellow-Legged Hornet (suggested common name), Vespa velutina (Lepeletier 1836) (Insecta: Hymenoptera: Vespidae) by Krystal Ashman, Oliver Keller, Cameron Jack

    Published 2020-05-01
    “…Vespa velutina has not been intercepted in North America, but it is believed to have high invasion potential. …”
    Get full text
    Article
  6. 226

    Novel blind recognition method for self-synchronized scrambler by Hong-shu LIAO, Ye YUAN, Lu GAN

    Published 2013-01-01
    “…In non-cooperative communication systems,an adversary has to blindly estimate the coding parameters of scrambler from intercepted sequence.On the condition biased information source,a new method was proposed which can blindly recover the generating polynomial of self-synchronized scrambler.This method was based on the corrected squared Euclidean distance which was used to measure the distance between the actual stat ical probability and the uniform distribution.The simulation results verify the theory analysis and the validity of the algorithm.…”
    Get full text
    Article
  7. 227

    Gender disparities in application and admission to the medical residency program in Peru: A cross sectional study from 2016 to 2023. by Daniel Medina-Neira, Brenda Caira-Chuquineyra, Daniel Fernandez-Guzman

    Published 2025-01-01
    “…Bayesian multilevel linear models were employed, incorporating random intercepts and slopes by specialty to account for variability across specialties. …”
    Get full text
    Article
  8. 228

    Oriental Fruit Fly, Bactrocera dorsalis (Hendel) (Insecta: Diptera: Tephritidae) by Howard V. Weems, John B. Heppner, James L. Nation, Thomas R. Fasulo

    Published 2012-03-01
    “…It is established in numerous areas in Asia, and is often intercepted in the United States, sometimes establishing infestations that were previously eradicated. …”
    Get full text
    Article
  9. 229

    Adaptive Integrated Guidance and Fault Tolerant Control Using Backstepping and Sliding Mode by Mohsen Fathi Jegarkandi, Asghar Ashrafifar, Reza Mohsenipour

    Published 2015-01-01
    “…A control law using combination of adaptive backstepping and sliding mode approaches is designed to achieve interception in the presence of bounded uncertainties and actuator fault. …”
    Get full text
    Article
  10. 230

    An Oriental Wood Borer, Heterobostrychus aequalis (Waterhouse) (Insecta: Coleoptera: Bostrichidae) by Robert E. Woodruff, Thomas R. Fasulo

    Published 2007-03-01
    “…Fasulo, describes this serious pest of lumber and stored wood products which has been found and intercepted at Florida ports, and is now established in the wild. …”
    Get full text
    Article
  11. 231

    Oriental Fruit Fly, Bactrocera dorsalis (Hendel) (Insecta: Diptera: Tephritidae) by Howard V. Weems, John B. Heppner, James L. Nation, Thomas R. Fasulo

    Published 2012-03-01
    “…It is established in numerous areas in Asia, and is often intercepted in the United States, sometimes establishing infestations that were previously eradicated. …”
    Get full text
    Article
  12. 232

    Study on authority watermark of the electronic chart based on the semantics characteristics by Ming-zhu LAI, Li-guo ZHANG, Wei-miao FENG, Yuan-yuan WANG, Yong WANG, Shou-zheng LI

    Published 2016-11-01
    “…In order to expand the function of watermarking technology, a concept of authority watermark, for which, wa-termarks defining the users' specific operations on the digital carriers was proposed. With interception technology on im-ages, the constructed authority watermark based on the semantics characteristics of the watermark images, through the interpretation of the watermarks, accessing behaviors on the electronic chart would be controlled. …”
    Get full text
    Article
  13. 233

    Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal by Jun Li

    Published 2013-08-01
    “…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
    Get full text
    Article
  14. 234

    An Oriental Wood Borer, Heterobostrychus aequalis (Waterhouse) (Insecta: Coleoptera: Bostrichidae) by Robert E. Woodruff, Thomas R. Fasulo

    Published 2007-03-01
    “…Fasulo, describes this serious pest of lumber and stored wood products which has been found and intercepted at Florida ports, and is now established in the wild. …”
    Get full text
    Article
  15. 235

    Slugs (of Florida) (Gastropoda: Pulmonata) by Lionel A. Stange, Jane E. Deisler

    Published 2005-06-01
    “…Eleven species of exotic slugs have been intercepted by USDA and DPI quarantine inspectors, but only one is known to be established. …”
    Get full text
    Article
  16. 236

    Slugs (of Florida) (Gastropoda: Pulmonata) by Lionel A. Stange, Jane E. Deisler

    Published 2005-06-01
    “…Eleven species of exotic slugs have been intercepted by USDA and DPI quarantine inspectors, but only one is known to be established. …”
    Get full text
    Article
  17. 237

    Modal Test and Analysis of the Engine,Gearbox and Frame of a Light Truck by Wang Junyuan, Li Weiwei, Ma Weijin, Zhang Jiping

    Published 2017-01-01
    “…The modal of engine,gearbox and frame are tested by the method of hammer excitation,and the modal parameters are obtained. Through interception the vibration signals when the empty light truck on washboard road and obstacles road,the modal test analysis of the vibration signal is carried out,the modal parameters of different stages of the light truck in the working environment are obtained. …”
    Get full text
    Article
  18. 238

    The Threat from European Missile Defence System to Russian National Security by A. I. Podberezkin, J. Y. Parshkova

    Published 2014-02-01
    “…The possibility of intercepting long-range missiles is postponed to the third (2018) and forth phases (2020). …”
    Get full text
    Article
  19. 239

    Multi-type low-rate DDoS attack detection method based on hybrid deep learning by Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU

    Published 2022-02-01
    “…Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack rate, and periodicity.Existing detection methods have the problems of single detection type and low identification accuracy.In order to solve them, a multi-type low-rate DDoS attack detection method based on hybrid deep learning was proposed.Different types of low-rate DDoS attacks and normal traffic in different scenarios under 5G environment were simulated.Traffic was collected at the network entrance and its traffic characteristic information was extracted to obtain multiple types of low-rate DDoS attack data sets.From the perspective of statistical threshold and feature engineering, the characteristics of different types of low-rate DDoS attacks were analyzed respectively, and the effective feature set of 40-dimension low-rate DDoS attacks was obtained.CNN-RF hybrid deep learning algorithm was used for offline training based on the effective feature set, and the performance of this algorithm was compared with LSTM-Light GBM and LSTM-RF algorithms.The CNN-RF detection model was deployed on the gateway to realize the online detection of multiple types of low-rate DDoS attacks, and the performance was evaluated by using the newly defined error interception rate and malicious traffic detection rate indexes.The results show that the proposed method can detect four types of low-rate DDoS attacks online, including Slow Headers attack, Slow Body attack, Slow Read attack and Shrew attack, and the error interception rate reaches 11.03% in 120 s time window.The detection rate of malicious traffic reaches 96.22%.It can be judged by the results that the proposed method can significantly reduce the intensity of low-rate DDoS attack traffic at the network entrance, and can be deployed and applied in the actual environment.…”
    Get full text
    Article
  20. 240

    Mandibular Symmetrical Bilateral Canine-Lateral Incisors Transposition: Its Early Diagnosis and Treatment Considerations by Yehoshua Shapira, Tamar Finkelstein, Rana Kadry, Shirley Schonberger, Nir Shpack

    Published 2016-01-01
    “…Early diagnosis and interceptive intervention may reduce the risk of possible transposition between the mandibular canine and lateral incisor. …”
    Get full text
    Article