Showing 21 - 40 results of 200 for search 'code (clone OR close) detection', query time: 0.12s Refine Results
  1. 21

    Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis by Gabriela Brezeanu, Alexandru Archip, Codrut-Georgian Artene

    Published 2025-01-01
    “…In addition, we successfully identified the phishing pages created by cloning the original source code of legitimate entities without requiring prior knowledge to distinguish such clones. …”
    Get full text
    Article
  2. 22

    Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment by Aleksandr Romanov, Anna Kurtukova, Anastasiia Fedotova, Alexander Shelupanov

    Published 2025-01-01
    “…The presented technique addresses several related tasks: assessing text homogeneity, detecting plagiarism when solving closed-set authorship attribution problems, and identifying texts and fragments created by generative models. …”
    Get full text
    Article
  3. 23
  4. 24

    Fine-mapping the HOXB region detects common variants tagging a rare coding allele: evidence for synthetic association in prostate cancer. by Edward J Saunders, Tokhir Dadaev, Daniel A Leongamornlert, Sarah Jugurnauth-Little, Malgorzata Tymrakiewicz, Fredrik Wiklund, Ali Amin Al Olama, Sara Benlloch, David E Neal, Freddie C Hamdy, Jenny L Donovan, Graham G Giles, Gianluca Severi, Henrik Gronberg, Markus Aly, Christopher A Haiman, Fredrick Schumacher, Brian E Henderson, Sara Lindstrom, Peter Kraft, David J Hunter, Susan Gapstur, Stephen Chanock, Sonja I Berndt, Demetrius Albanes, Gerald Andriole, Johanna Schleutker, Maren Weischer, Børge G Nordestgaard, Federico Canzian, Daniele Campa, Elio Riboli, Tim J Key, Ruth C Travis, Sue A Ingles, Esther M John, Richard B Hayes, Paul Pharoah, Kay-Tee Khaw, Janet L Stanford, Elaine A Ostrander, Lisa B Signorello, Stephen N Thibodeau, Daniel Schaid, Christiane Maier, Adam S Kibel, Cezary Cybulski, Lisa Cannon-Albright, Hermann Brenner, Jong Y Park, Radka Kaneva, Jyotsna Batra, Judith A Clements, Manuel R Teixeira, Jianfeng Xu, Christos Mikropoulos, Chee Goh, Koveela Govindasami, Michelle Guy, Rosemary A Wilkinson, Emma J Sawyer, Angela Morgan, COGS-CRUK GWAS-ELLIPSE (Part of GAME-ON) Initiative, UK Genetic Prostate Cancer Study Collaborators, UK ProtecT Study Collaborators, PRACTICAL Consortium, Douglas F Easton, Ken Muir, Rosalind A Eeles, Zsofia Kote-Jarai

    Published 2014-02-01
    “…We identified a cluster of highly correlated common variants situated within or closely upstream of HOXB13 that were significantly associated with PrCa risk, described by rs117576373 (OR 1.30, P = 2.62×10(-14)). …”
    Get full text
    Article
  5. 25
  6. 26

    Cloning, expression, and polymorphism of the ECI1 gene in various pig breeds by Yun-feng LU, Ji-bao CHEN, Bo ZHANG, Qing-gang LI, Zhi-xiu WANG, Hao ZHANG, Ke-liang WU

    Published 2017-08-01
    “…We obtained an ECI1 gene length of 1 401 bp from the cDNA that contained a full coding region of 909 bp. Three novel SNPs (g.42425337G>A; g.42424666A>G; and g.42422755A>G) were detected, and only g.42424666A>G exhibited three genotypes among the three breeds. …”
    Get full text
    Article
  7. 27

    Infrastructure as Code for Cybersecurity Training by Rui Pinto, Rolando Martins, Carlos Novo

    Published 2023-10-01
    “…An approach closely related to virtualization and containerization as the code's underlying infrastructure helps lay down this burden. …”
    Get full text
    Article
  8. 28
  9. 29

    LH Gene Cloning, Sequence Feature Analysis and Prokaryotic Expression in Conger myriaster by Yan CHEN, Bao SHI, Chenggang WANG, Wanjun BO, Kewen YAN, Meijun TAO, Xinyu ZHAO, Xiaodong MA

    Published 2025-06-01
    “…However, the expression of reproductive axis genes and the regulation of reproductive-related hormones, specifically in C. myriaster, are not well understood. In this study, the coding sequence (CDS) of the LH gene was cloned using PCR techniques. …”
    Get full text
    Article
  10. 30
  11. 31

    Joint Iterative Decoding Design of Cooperative Downlink SCMA Systems by Hao Cheng, Min Zhang, Ruoyu Su

    Published 2025-07-01
    “…Sparse code multiple access (SCMA) has been a competitive multiple access candidate for future communication networks due to its superiority in spectrum efficiency and providing massive connectivity. …”
    Get full text
    Article
  12. 32

    Cloning and expression analysis of a transcription factor gene BoWRKY2 from broccoli by Jiang Ming, Chen Beibei, Guan Ming, Li Jinzhi, Huang Xiaomei, Gu Yunji

    Published 2015-03-01
    “…Based on sequence analysis, expression patterns of BoWRKY2 were detected using reverse transcription-polymerase chain reaction (RT-PCR) method while challenged by H. parasitica and S. sclerotiorum, respectively.The results showed that the genome DNA sequence was 1 507 bp in length with two introns and a complete coding sequence of 987 bp, and the length of two introns were 425 and 95 bp, respectively; BoWRKY2 encoded 328 amino acids with a WRKYGQK residue and a zinc finger structure of C-X<sub>5</sub>-C-X<sub>23</sub>-H-X<sub>1</sub>-H. …”
    Get full text
    Article
  13. 33

    Cloning of lactoferrin gene of mice and the difference of lactoferrin gene expression in mammary gland at different lactation stages by WANG Yi-zhen, HAN Fei-fei, HUANG Hai-qing

    Published 2004-01-01
    “…A cDNA fragment about 897 bp in length was obtained through RT-PCR. The PCR product was cloned into pGEM-T vector and then sequenced. Sequence analysis suggested that this fragment corresponded to a portion of the sequence of lactoferrin cDNA and coded 299 amino acid residues, which constituted the major part of mature lactoferrin. …”
    Get full text
    Article
  14. 34

    Cloning and Analysis of the Expansin Gene BdEXP1 from Migration Plant parasitic Nematode (Bursaphelenchus doui) by Kaiyang GUO, Shifeng LIN, Rengang WANG, Li LI, Jie ZHANG, Shizhou YU, Zili WANG, Guoqin LIU

    Published 2025-04-01
    “…Further, the BdEXP1 expression pattern was investigated by real-time fluorescent quantitative PCR and the expression location was detected by in situ hybridization.【Result】The full-length cDNA of BdEXP1 gene was cloned (GenBank accession number: PQ276072). …”
    Get full text
    Article
  15. 35
  16. 36

    Exosomal Long NonCoding Rnas as Cancer Biomarkers and Therapeutic Targets by O. A. Beylerli, I. F. Gareev, V. N. Pavlov, Zhao Shiguang, Chen Xin, V. V. Kudriashov

    Published 2020-01-01
    “…The most promising of all these molecules are non-coding RNAs (ncRNAs), including microRNAs and long non-coding RNAs (lncRNAs). …”
    Get full text
    Article
  17. 37

    Cloning and expression analysis of a detoxification enzyme BmmGSTo3 gene in wild silkworm, Bombyx mandarina (Lepidoptera: Bombycidae) by Ruonan LI, Enxi CHEN, Yuming ZHANG, Mengjiao WANG, Lin ZHU, Yixuan QIAN, Guodong ZHAO, Heying QIAN

    Published 2025-03-01
    “…In this study, the GSTo3 gene, coding glutathione S-transferase of B. mandarina, was cloned and its physicochemical properties and structures were predicted using bioinformatics tools. …”
    Get full text
    Article
  18. 38
  19. 39

    Implementation of Eye-To-Text Morse Code Device to Help Speech Impairments People by Pujianti Wahyuningsih, Matalangi Matalangi

    Published 2025-03-01
    “…The object of this research is the eye, where if the system detects the eye in an open state, it is converted into a dot code or value 1, while when the system detects the eye as closed, it is converted into a dash code or value 0. …”
    Get full text
    Article
  20. 40

    Enhancing Malware Analysis Using Data Visualization Through Shared Code and Attribute Analysis by Narayandas Sai Ramana Vashista, K. Abhimanyu Kumar Patro

    Published 2025-01-01
    “…The integration of the Jaccard Index and MinHash provides an extensive method for covering the relationships among malware and enhancing detection and categorization steps. The proposed approach not only provides a better understanding of code patterns, but it also helps visualize attribute-based maximum similarity, making it a valuable tool for researchers and cybersecurity professionals.…”
    Get full text
    Article