Repositorio UMAYOR: Envíos recientes
Mostrando ítems 3001-3020 de 7937
-
Defective sperm head decondensation undermines the success of ICSI in the bovine
(BioScientifica Ltd., 2017)The efficiency of intracytoplasmic sperm injection (ICSI) in the bovine is low compared to other species. It is unknown whether defective oocyte activation and/or sperm head decondensation limit the success of this technique ... -
Phenotype of Aeromonas salmonicida sp. salmonicida cyclic adenosine 3′,5′-monophosphate receptor protein (Crp) mutants and its virulence in rainbow trout (Oncorhynchus mykiss)
(Wiley-Blackwell Publishing Ltd, 2017)Precise deletion of genes related to virulence can be used as a strategy to produce attenuated bacterial vaccines. Here, we study the deletion of the cyclic-3,5-adenosine monophosphate (cAMP) receptor protein (Crp) in ... -
¿Puede el ejercicio físico per se disminuir el peso corporal en sujetos con sobrepeso/obesidad?
(Sociedad Medica de Santiago, 2017)The prevalence of overweight and obesity is increasing, creating a public health problem. The loss of approximately 10% of body weight is recommended to reduce the risk of mortality associated with metabolic diseases and ... -
Draft genome sequence of Epilithonimonas sp. FP211-J200, isolated from an outbreak episode on a rainbow trout (Oncorhynchus mykiss) farm
(American Society for Microbiology, 2017)Here, we report the draft genome sequence of Epilithonimonas sp. FP211-J200, isolated from rainbow trout head kidney cells. The size of the genome is 4,110,772 bp, with a G+C content of 37.1%. The Epilithonimonas sp. ... -
Draft genome sequence of xanthomonas arboricola pv. juglandis J303, Isolated from infected walnut trees in Southern Chile
(American Society for Microbiology, 2017)Here, we report the draft genome sequence of Xanthomonas arboricola pv. juglandis J303, isolated from infected walnut trees in southern Chile. The size of the genome is 5,066,424 bp with a G+C content of 65.4%. X. arboricola ... -
Asymptotic approach to the one-dimensional motion of a body in modified Newtonian dynamics
(IOP Publishing Ltd., 2017)In this paper, the one-dimensional motion of a body is studied under the scheme of 'modified Newtonian dynamics' (MOND). Through the asymptotic analysis, approximate analytical expressions for the body movement are found. ... -
Subcutaneous Lipoatrophy and Skin Depigmentation Secondary to TMJ Intra-Articular Corticosteroid Injection
(Royal Society Publishing, 2017)Chronic orofacial pain is a complex multidimensional experience that produces disability and impairment of normal mandibular function. Overall estimations of chronic orofacial pain prevalence are 7 to 11% of the general ... -
Private protected areas, ecotourism development and impacts on local people's well-being: a review from case studies in Southern Chile
(Taylor and Francis Ltd., 2017)Private protected areas (PPAs) are expanding rapidly in less-industrialized nations. This paper explores cases in Los Rios, Chile, to understand how local people living in and near three PPAs viewed impacts of tourism ... -
Interferometría digital multicuadro usando un único sistema de registro digital
(Published in: 2016 IEEE International Conference on Automatica (ICA-ACCA), 19-21 Oct. 2016, 2016)In this work a multi-frame interferometric system based in digital image processing and digital interferometry is presented. Here, an experimental optical setup which integrates the virtues of the digital interferometry ... -
A semi-automatic tool for the connectivity tracking of neuronal processes acquired using electron microscopy
(Public Library of Science, 2015)We describe an image processing tool for helping to organize, annotate and map neuronal circuitry. The tools use high-resolution images serially acquired via scanning electron microscopy (SEM). First, various image processing ... -
Malware on mobile devices odds of infection based on running operating system version
(Asian Pacific Organization for Cancer Prevention, 2016)The world of mobile devices which have the quality to stay connected to the web is going through a exponential growth, but in parallel with this event, appears the threats with the developing of an equal magnitude, which ... -
Obfuscation procedure based in dead code insertion into crypter
(IEEE, 2016)The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique ... -
Modification of the optical flow horn-schunck estimation incorporating exaustive search
(IEEE, 2016)Optical Flow is the pixels apparent movement pattern of two consecutives images. There are differents methods to estimate the optical flow: variational methods and exaustive methods. Exhaustive methods take a neighborhood ... -
SGSI support throught malware's classification using a pattern analysis
(IEEE, 2016)Nowadays, there are significant amounts of malware codes that are created every day. However, the majority of these samples (malware) are variations of other malware that have been already identified. Therefore, most of ... -
Genotyping and Persistence of Candida albicans from Pregnant Women with Vulvovaginal Candidiasis
(Springer Netherlands, 2017)Objective To study Candida albicans genotypes using RAPD and their susceptibility to fluconazole in healthy pregnant women and in vulvovaginal candidiasis (VVC) patients after topical treatment with clotrimazole. Methods ... -
Down's syndrome, anorectal malformation and Morgagni's hernia: Description of an unusual clinic case
(Via Medica, 2017)Morgagni's hernia is a rare type of congenital diaphragmatic hernia that constitutes less than 5% of congenital diaphragmatic defects. It is moderately associated with congenital anomalies, while it is rarely associated ... -
Real time optical flow estimation for images with large displacements
(2016 IEEE International Conference on Automatica (ICA-ACCA), 2016)Optical flow is defined as the pattern of apparent motion of objects in a image sequence. Optical flow has many applications: control of automatic taking off and landing of an autonomous aircraft, video compression, noise ... -
Matlab programmed method for the optical flow estimation based on the integral image
(IEEE, 2018)The Optical Flow computation is the estimation of the apparent displacement of the object on an image sequence (actual image and next image). There are different methods for Optical Flow estimation, standing out exhaustive ... -
Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
(IEEE, 2018)What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires ... -
Implementation of an emitting LED circuit in a Visible Light communications positioning system
(2018)In this paper, two LED emitting circuits are implemented in a VLC positioning system, a regular Bias-Tee and a circuit proposed by Ghassemlooy, aiming to provide the system with portability and functionality. For this, an ...