Buscar
Mostrando ítems 21-30 de 30
Bioinformatic analyses of unique (orphan) core genes of the genus Acidithiobacillus: Functional inferences and use as molecular probes for genomic and metagenomic/transcriptomic interrogation
(Facultad de Ciencias, 2016)
Using phylogenomic and gene compositional analyses, five highly conserved gene families have been detected in the core genome of the phylogenetically coherent genus Acidithiobacillus of the class Acidithiobacillia. These ...
Histological comparison of an allograft, a xenograft and alloplastic graft as bone substitute materials
(Ariesdue srl, 2016)
Aim An allograft, a xenograft and an alloplastic graft, associated to sinus lift or ridge preservation procedures were histologically studied to evaluate their characteristics and to obtain the percentages of bone and ...
Does the presence of primary circulating prostate cells imply the presence of agressive prostate cancer with early biochemical failure: A comparison with the Walz Nomogram
(Asian Pacific Organization for Cancer Prevention, 2016)
Background: To determine the utility of primary circulating prostate cells (CPC) for predicting early biochemical failure after radical prostatectomy for prostate cancer and compare the results with the Walz nomogram. ...
Interferometría digital multicuadro usando un único sistema de registro digital
(Published in: 2016 IEEE International Conference on Automatica (ICA-ACCA), 19-21 Oct. 2016, 2016)
In this work a multi-frame interferometric system based in digital image processing and digital interferometry is presented. Here, an experimental optical setup which integrates the virtues of the digital interferometry ...
Malware on mobile devices odds of infection based on running operating system version
(Asian Pacific Organization for Cancer Prevention, 2016)
The world of mobile devices which have the quality to stay connected to the web is going through a exponential growth, but in parallel with this event, appears the threats with the developing of an equal magnitude, which ...
Obfuscation procedure based in dead code insertion into crypter
(IEEE, 2016)
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique ...
Modification of the optical flow horn-schunck estimation incorporating exaustive search
(IEEE, 2016)
Optical Flow is the pixels apparent movement pattern of two consecutives images. There are differents methods to estimate the optical flow: variational methods and exaustive methods. Exhaustive methods take a neighborhood ...
SGSI support throught malware's classification using a pattern analysis
(IEEE, 2016)
Nowadays, there are significant amounts of malware codes that are created every day. However, the majority of these samples (malware) are variations of other malware that have been already identified. Therefore, most of ...
Real time optical flow estimation for images with large displacements
(2016 IEEE International Conference on Automatica (ICA-ACCA), 2016)
Optical flow is defined as the pattern of apparent motion of objects in a image sequence. Optical flow has many applications: control of automatic taking off and landing of an autonomous aircraft, video compression, noise ...
Schwann cell and axon: An interlaced unit—From action potential to phenotype expression
(Facultad de Ciencias, 2016)
Here we propose a model of a peripheral axon with a great deal of autonomy from its cell body-the autonomous axon-but with a substantial dependence on its ensheathing Schwann cell (SC), the axon-SC unit. We review evidence ...