Search Results - Detective Branch

Refine Results
  1. 1

    Branched DNA: a novel technique for molecular diagnostics in bone studies by Ahmad Ariffin, Siti Noor Fathilah

    Published 2013
    “…Currently, there is an in-creasing use of the branched chain DNA (bDNA) signal amplification technology. …”
    Get full text
    Get full text
  2. 2
  3. 3

    Synthesis and characterization of branched polymers via anionic polymerization based on “strathclyde approach” / Shehu Habibu by Shehu , Habibu

    Published 2019
    “…The nature of the reaction was studied on the TMEDA/Li ratio as well as the DVB/Li ratio. The obtained branched polymers were characterized by triple detection size exclusion chromatography (SEC), nuclear magnetic resonance (NMR) spectroscopy, melt rheology, thermogravimetric analysis (TGA), differential scanning calorimetry (DSC) and transmission electron microscopy (TEM). …”
    Get full text
    Get full text
    Get full text
  4. 4

    Distribution of airway narrowing responses across generations and at branching points, assessed in vitro by anatomical optical coherence tomography by Noble, P., McLaughlin, R., West, A., Becker, S., Armstrong, J., McFawn, P., Eastwood, Peter, Hillman, D., Sampson, D., Mitchell, H.

    Published 2010
    “…Heterogeneity can occur at different airway generations and at branching points in the bronchial tree. Whilst heterogeneity has been detected by previous experimental approaches, its spatial relationship either within or between airways is unknown.Methods: In this study, distribution of airway narrowing responses across a portion of the porcine bronchial tree was determined in vitro. …”
    Get full text
  5. 5

    Isolation of cDNA fragment encoding starch branching enzyme (Isoform) gene from metroxylon Sagu by rt pcr method by Tajuddin Sidek, Bin Hairaddin.

    Published 2006
    “…Isolation and characterization of Starch Branching Enzyme (SBE) isoform I gene was the main objective of this study, where the target was to construct the cDNA from total RNA by using the specific primer that design manually. …”
    Get full text
    Get full text
  6. 6

    Effective algorithms for subwindow search in object detection and localization by An, Senjian, Peursum, Patrick, Liu, Wan-quan, Venkatesh, Svetha

    Published 2009
    “…Recently, a simple yet powerful branch-and-bound method called Efficient Subwindow Search (ESS) was developed to speed up sliding window search in object detection. …”
    Get full text
    Get full text
  7. 7
  8. 8
  9. 9

    Efficient algorithms for subwindow search in object detection and localization by An, S., Peursum, P., Liu, Wan-Quan, Venkatesh, S.

    Published 2009
    “…Recently, a simple yet powerful branch-and-bound method called Efficient Subwindow Search (ESS) was developed to speed up sliding window search in object detection. …”
    Get full text
  10. 10
  11. 11

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…While the field of data mining has been studied extensively, most of the work has concentrated on discovery of patterns. Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
    Get full text
    Get full text
  12. 12

    Detecting and analysing changes in consumer behaviour during life events by Darler, William

    Published 2019
    “…This thesis is split into six case studies that utilise predictive and descriptive branches of analytics to make methodological contributions to literature on consumer behaviour during life events. …”
    Get full text
  13. 13

    An FPGA based embedded vision system for real-time motion detection by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2015
    “…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
    Get full text
    Get full text
  14. 14

    Detecting conservation benefits of marine reserves on remote reefs of the northern GBR by Castro-Sanguino, C., Bozec, Y., Dempsey, A., Samaniego, B., Lubarsky, K., Andrews, S., Komyakova, V., Ortiz, J., Robbins, William, Renaud, P., Mumby, P.

    Published 2017
    “…Here, we find that the detection of reserve effects is challenging and that heterogeneity in benthic habitat composition, specifically branching coral cover, is one of the strongest driving forces of fish assemblages. …”
    Get full text
  15. 15

    Detection of dynamic background due to swaying movements from motion features by Pham, DucSon, Arandjelovic, O., Venkatesh, S.

    Published 2015
    “…In the context of event detection, it is a major source of false alarms. There is a strong need from the security industry either to detect and suppress these false alarms, or dampen the effects of background changes, so as to increase the sensitivity to meaningful events of interest. …”
    Get full text
  16. 16

    Characterisation of the anabolic effects of leucine on primary chicken muscle cells and murine C2C12 muscle cells by Elsaied, Nashwa

    Published 2021
    “…Leucine is a branched-chain amino acid, which possesses a unique ability to stimulate the rate of protein synthesis in muscle cells both in vivo and in vitro. …”
    Get full text
  17. 17
  18. 18
  19. 19

    Effects of the power differences in the AND-subtraction detection technique in SAC-OCDMA system performance by Zan, Zuraidah, Syed Junid, Syed Alwee Aljunid, Abdullah, Mohamad Khazani, Sahbudin, Ratna Kalos Zakiah, Yaacob, Mohd Hanif, Mokhtar, Makhfudzah, Shaari, Sahbudin

    Published 2006
    “…The study is mainly focusing on the effects of the power differences between the upper and lower branches of the AND-subtraction technique used as the detection technique to the system performance. …”
    Get full text
    Get full text
  20. 20

    Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning by Sia, Ken Yen

    Published 2022
    “…Most of the current detection models only provide a guideline framework in detecting such attacks which is not efficient or with low accuracy. …”
    Get full text
    Get full text