Showing 61 - 80 results of 200 for search 'code (clone OR close) detection', query time: 0.13s Refine Results
  1. 61

    Accidental Detection of Cocaine in Urine in Pediatric Patients: Case Series and Literature Review by Martina Focardi, Ilenia Bianchi, Marta Romanelli, Valentina Gori, Laura Nanni, Fabio Vaiano, Stefania Losi

    Published 2024-10-01
    “…In all cases, a report was made to the Prosecutors as required by the Italian Penal Code, as well as to the Court of Minor. The study highlighted the importance of a multidisciplinary approach involving pediatricians, social workers, and forensics, as well as close collaboration with the relevant authorities, as the Gaia service at IRCCS Meyer offers. …”
    Get full text
    Article
  2. 62

    Quality Management in Software Development by M. D. Birulia

    Published 2024-09-01
    “…The algorithm allows quality experts to build the sequence of actions to eliminate detected defects in the future, understand the situation when it is possible (or impossible) to deploy code, and determine the moment when the software should be transferred to the user. …”
    Get full text
    Article
  3. 63

    Multistage pig identification using a sequential ear tag detection pipeline by Martin Wutke, Damiano Debiasi, Shobhana Tomar, Jeanette Probst, Nicole Kemper, Kai Gevers, Marc-Alexander Lieboldt, Imke Traulsen

    Published 2025-06-01
    “…In a first evaluation stage, we assessed the performance of each model independently, achieving a mAP0.95 value of 0.970, 0.979, 0.974 and 0.979 for the pig detection, ear tag detection, pin detection and ID classification model, respectively. …”
    Get full text
    Article
  4. 64

    First Detection and Molecular Characterization of Peach Latent Mosaic Viroid (PLMVd) in Kazakhstan by Gulshan E. Stanbekova, Leila T. Nadirova, Ruslan V. Kryldakov, Bulat K. Iskakov, Andrey V. Zhigailov

    Published 2025-03-01
    “…The incidence of the PLMVd in the peach (19.23%; 15/78) was significantly higher than that in the apricot (6.76%; 5/74; <i>p</i> = 0.0234). Eight of the detected viroids were cloned and used for full-genome sequencing. …”
    Get full text
    Article
  5. 65

    Preparation and quality detection on gene chip of head cDNA from Apis cerana cerana by YANG Yu-xiao, SHEN Li-rong, GAO Qi-kang, HONG Xu-tao, CHENG Jia-an

    Published 2009-01-01
    “…With the plasmids extracted from the clones of the cDNA library which were selected according to candidate EST code as templates, 717 valid EST probers were amplified with PCR reaction and detected with gel electrophoresis. …”
    Get full text
    Article
  6. 66

    Copy number-based quantification assay for non-invasive detection of PVT1-derived transcripts. by Gargi Pal, Olorunseun O Ogunwobi

    Published 2019-01-01
    “…Here, we describe a real-time quantitative polymerase chain reaction (qPCR)-based assay for copy number-based quantitation of PVT1 exons 4A, 4B, and 9 to enable accurate, reproducible, and quantifiable detection.<h4>Methods</h4>PVT1 exons 4A, 4B, and 9 were cloned into a plasmid vector to create standards for subsequent creation of linear standard curves representing a broad range of concentrations. …”
    Get full text
    Article
  7. 67

    Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection by Rodrigo Eduardo Arevalo-Ancona, Manuel Cedillo-Hernandez

    Published 2025-06-01
    “…This paper presents a robust multitask zero-watermarking scheme for ownership authentication, auxiliary information embedding, and tamper detection using a dual-branch neural network. The proposed method generates three zero-watermarking codes stored in a three-layer structure, where each layer corresponds to a different type of watermark: a binary logo for ownership authentication, a QR code for auxiliary data, and a halftone version of the original image for tamper detection. …”
    Get full text
    Article
  8. 68

    Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters by Aditya Sissodiya, Eric Chiquito, Ulf Bodin, Johan Kristiansson

    Published 2025-01-01
    “…Yet most deployments still rely on a patchwork of Role-Based Access Control (RBAC) rules and policy-as-code admission controllers such as OPA Gatekeeper or Kyverno. …”
    Get full text
    Article
  9. 69

    The Image of Central European Immigrant in Popular Fiction and Its Adaptations: A Case Study of the Detective Murdoch/Murdoch Mysteries Series by Biljana Oklopcic

    Published 2023-11-01
    “…Westerns, fantasies, romances, mysteries, science fiction, adventures, etc. must have a certain kind of setting, a particular cast of (stereotypical) characters, and follow a limited number of lines of action because of their close connection to a particular society, culture, and time period. …”
    Get full text
    Article
  10. 70

    Characterization of small nucleolar RNA retaining transcripts in human normal and cancer cells by Guglielmo Rambaldelli, Sidra Asghar, Giulia Venturi, Federico Zacchini, Margherita Serra, Catia Giovannini, Laura Gramantieri, Marco Bernini, Alberto Inga, Erik Dassi, Lorenzo Montanaro

    Published 2025-08-01
    “…Small nucleolar RNAs are non-coding RNAs typically encoded within the introns of both protein-coding and non-coding genes. …”
    Get full text
    Article
  11. 71

    Precise Performance Analysis of Dual-Hop Mixed RF/Unified-FSO DF Relaying With Heterodyne Detection and Two IM-DD Channel Models by Omer Mahmoud Salih Al-Ebraheemy, Anas M. Salhab, Anas Chaaban, Salam A. Zummo, Mohamed-Slim Alouini

    Published 2019-01-01
    “…This paper provides precise performance analysis of the dual-hop mixed radio frequency (RF)/unified free space optical (FSO) decode-and-forward (DF) relaying system, in which the heterodyne detection and the intensity modulation-direct detection (IM-DD) are taken into account for FSO detection. …”
    Get full text
    Article
  12. 72
  13. 73

    Validation of a one-step reverse transcription PCR detection method for Tobamovirus maculatessellati, in tomato (Solanum lycopersicum L.) and pepper (Capsicum annuum L.) by Chellappan Padmanabhan, Andrea Gilliard, Kai-Shu Ling, Yazmín Rivera

    Published 2025-01-01
    “…The solanaceous-infecting tobamoviruses are closely related and hence it can be challenging to detect them using serological or molecular methods, particularly when present in a mixed infection. …”
    Get full text
    Article
  14. 74

    The JWST Early Release Science Program for Direct Observations of Exoplanetary Systems. III. Aperture Masking Interferometric Observations of the Star HIP 65426 at 3.8 μm by Shrishmoy Ray, Steph Sallum, Sasha Hinkley, Anand Sivaramkrishnan, Rachel Cooper, Jens Kammerer, Alexandra Z. Greebaum, Deeparshi Thatte, Tomas Stolker, Cecilia Lazzoni, Andrei Tokovinin, Matthew de Furio, Samuel Factor, Michael Meyer, Jordan M. Stone, Aarynn Carter, Beth Biller, Andrew Skemer, Genaro Suárez, Jarron M. Leisenring, Marshall D. Perrin, Adam L. Kraus, Olivier Absil, William O. Balmer, Anthony Boccaletti, Mariangela Bonavita, Mickael Bonnefoy, Mark Booth, Brendan P. Bowler, Zackery W. Briesemeister, Marta L. Bryan, Per Calissendorff, Faustine Cantalloube, Gael Chauvin, Christine H. Chen, Elodie Choquet, Valentin Christiaens, Gabriele Cugno, Thayne Currie, Camilla Danielski, Trent J. Dupuy, Jacqueline K. Faherty, Michael P. Fitzgerald, Jonathan J. Fortney, Kyle Franson, Julien H. Girard, Carol A. Grady, Eileen C. Gonzales, Thomas Henning, Dean C. Hines, Kielan K. W. Hoch, Callie E. Hood, Alex R. Howe, Markus Janson, Paul Kalas, Grant M. Kennedy, Matthew A. Kenworthy, Pierre Kervella, Masayuki Kuzuhara, Anne-Marie Lagrange, Pierre-Olivier Lagage, Kellen Lawson, Ben W. P. Lew, Michael C. Liu, Pengyu Liu, Jorge Llop-Sayson, James P. Lloyd, Bruce Macintosh, Sebastian Marino, Mark S. Marley, Christian Marois, Raquel A. Martinez, Brenda C. Matthews, Elisabeth C. Matthews, Dimitri Mawet, Johan Mazoyer, Michael W. McElwain, Stanimir Metchev, Michael R. Meyer, Brittany E. Miles, Maxwell A. Millar-Blanchaer, Paul Molliere, Sarah E. Moran, Caroline V. Morley, Sagnick Mukherjee, Paulina Palma-Bifani, Eric Pantin, Polychronis Patapis, Simon Petrus, Laurent Pueyo, Sascha P. Quanz, Andreas Quirrenbach, Isabel Rebollido, Jea Adams Redai, Bin B. Ren, Emily Rickman, Matthias Samland, Joshua E. Schlieder, Glenn Schneider, Karl R. Stapelfeldt, Motohide Tamura, Xianyu Tan, Taichi Uyama, Arthur Vigan, Malavika Vasist, Johanna M. Vos, Kevin Wagner, Jason J. Wang, Kimberly Ward-Duong, Niall Whiteford, Schuyler G. Wolff, Kadin Worthen, Mark C. Wyatt, Marie Ygouf, Xi Zhang, Keming Zhang, Zhoujian Zhang, Yifan Zhou, Alice Zurlo, B. A. Sargent, Christopher A. Theissen, Elena Manjavacas, Anna Lueber, Daniel Kitzmann, Ben J. Sutlieff, Sarah K. Betti

    Published 2025-01-01
    Get full text
    Article
  15. 75
  16. 76
  17. 77

    Effect of lncRNA H19 on Rats with Chronic Heart Failure Based on TGF-β1/Smad3 Signaling Pathway by WANG Lingyan, CAO Guojun, MEI Yang, ZHANG Bin, ZHOU Shijing

    Published 2023-12-01
    “…ObjectiveTo explore the effect of long non-coding RNA H19 (lncRNA H19) and microRNA (miRNA)-200a on cardiac function and myocardial fibrosis in rats with chronic heart failure based on transforming growth factor-β1 (TGF-β1)/Smad homolog 3 (Smad3) signaling pathway.MethodsA total of 60 clean grade adult healthy male SD rats were randomly divided into sham surgery group and model group. …”
    Get full text
    Article
  18. 78

    Targeting microRNA methylation: Innovative approaches to diagnosing and treating hepatocellular carcinoma by Albert Sufianov, Murad Agaverdiev, Andrey Mashkin, Tatiana Ilyasova

    Published 2025-04-01
    “…Emerging research has underscored the vital role of microRNAs (miRNAs)—small, non-coding RNA molecules that play a pivotal part in the post-transcriptional regulation of gene expression. …”
    Get full text
    Article
  19. 79
  20. 80

    Predicting software reuse using machine learning techniques-A case study on open-source Java software systems. by Matthew Yit Hang Yeow, Chun Yong Chong, Mei Kuan Lim, Yuen Yee Yen

    Published 2025-01-01
    “…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
    Get full text
    Article