نتایج جستجو برای: known positives

تعداد نتایج: 729104  

2012
Nobuyuki Takasu Mina Matsushita

TWO TRABS: TSBAb and TSAb. TSBAb causes hypothyroidism. TSAb causes Graves' hyperthyroidism. TSBAb and TSAb block TSH-binding to cells as TRAb, measured as TSH-binding inhibitory immunoglobulin (TBII). We reevaluate TSBAb and TSAb. We studied TSBAb, TSAb, and TBII over 10 years in 34 TSBAb-positives with hypothyroidism and in 98 TSAb-positives with hyperthyroidism. Half of the 34 TSBAb-positive...

Journal: :Clinical chemistry 2012
Ann M Moyer

Both procedures used iodinated contrast media, iohexol (Omnipaque 350; GE Healthcare) in this case. The cause of the “floating gel” was an increase in serum density from residual contrast dye still present in the catheter used for the procedures (1 ). Laboratory tests should not be performed, even if the serum is extracted from beneath the gel barrier. The effect of residual dye is unknown, but...

Journal: :Circulation 1977
J P Liss

acceleration occurs at the time of valve closure, apparently as a result of the narrowing of the orifice in the face of this forward flow. In contrast, aortic valve closure occurs after cessation of forward flow in aortic stenosis,8 and hence no acceleration and no resulting augmentation of the murmur would be expected. Although the editorial raised a number of other points, with which we disag...

1998
Colin Boyd Anish Mathuria

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.

Journal: :IACR Cryptology ePrint Archive 2004
Adam J. Slagell

One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.

2008
Nicholas Fleisher Chris Barker Andrew Garrett Irene Heim Chris Kennedy

Research on the semantics of gradable adjectives has, among others, the following two preoccupations: the nature of the degree-comparison relation expressed by the degree morphology (more/-er, less, etc.) and the way in which the standard of comparison is expressed. Here I wish to examine a combination of these two elements that has not, to the best of my knowledge, been described before. In pa...

Journal: :Social cognitive and affective neuroscience 2009
Craig M Bennett George L Wolford Michael B Miller

An incredible amount of data is generated in the course of a functional neuroimaging experiment. The quantity of data gives us improved temporal and spatial resolution with which to evaluate our results. It also creates a staggering multiple testing problem. A number of methods have been created that address the multiple testing problem in neuroimaging in a principled fashion. These methods pla...

2011
HH Balkhy A El-Saed F Al Hejaili M Sallah B Abu Khzam A Sayyari

Results Out of 198 positive blood cultures recorded during the study, 174 (88%) were access-associated bacteremia. The majority (89%) of these bacteremias were cause by a single organism. Out of the 190 organism identified 51.6% gramnegatives, 39.5% gram-positives, 8.5% skin contaminants, and 0.5% fungi. There was no significant difference of the organism distribution between those with cathete...

2014
Loris Nanni Alessandra Lumini Fabio Dominio Pietro Zanuttigh

In this work an effective face detector based on the well-known Viola-Jones algorithm is proposed. A common issue in face detection is that for maximizing the face detection rate a low threshold is used for classifying as face an input image, but at the same time using a low threshold drastically increases the number of false positives. In this paper several criteria are proposed for reducing f...

2014
Hyesook Lim Nara Lee Jungwon Lee Changhoon Yim

A Bloom filter is a compact data structure that supports membership queries on a set, allowing false positives. The simplicity and the excellent performance of a Bloom filter make it a standard data structure of great use in many network applications. In reducing the false positive rate of a Bloom filter, it is well known that the size of a Bloom filter and accordingly the number of hash indice...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید