Journal articles on the topic 'IDS'

To see the other types of publications on this topic, follow the link: IDS.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ho, Catherine C., and Daniel J. Bernard. "Bone Morphogenetic Protein 2 Acts via Inhibitor of DNA Binding Proteins to Synergistically Regulate Follicle-Stimulating Hormone β Transcription with Activin A." Endocrinology 151, no. 7 (May 12, 2010): 3445–53. http://dx.doi.org/10.1210/en.2010-0071.

Full text
Abstract:
We recently reported that bone morphogenetic proteins (BMPs) 2 and 4 can stimulate FSHβ-subunit (Fshb) transcription alone and in synergy with activins. We further showed that BMP2 signals via the BMP type IA receptor (or activin receptor-like kinase 3) to mediate its effects. However, the intracellular mechanisms through which BMP2 regulates Fshb are unknown. In the current study, we used cDNA microarray analyses (and validation by real-time quantitative RT-PCR) to identify BMP2 target genes in the murine gonadotrope cell line, LβT2. Short-interfering RNA-mediated knockdown, overexpression, and coimmunoprecipitation experiments were used to examine the potential functional roles of selected gene products. Quantitative RT-PCR analysis largely confirmed the results of the array analyses, and inhibitors of DNA binding 1, 2, and 3 (Id1, Id2, and Id3) were selected for functional analyses. Knockdown of endogenous Id2 or Id3, but not Id1, diminished the synergistic effects of BMP2 and activin A on Fshb transcription. Overexpression of Id1, Id2, or Id3 alone had no effect, but all three potentiated activin A or mothers against decapentaplegic homolog (SMAD)3 induction of Fshb transcription. Though the precise mechanism through which Ids produce their effects are not yet known, we observed physical interactions between Id1, Id2, or Id3 and SMAD3. Collectively, the data suggest that BMP2 synergistically regulates Fshb transcription with activins, at least in part, through the combined actions of Ids 2 or 3 and SMAD3.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Suman. "IDS with Hybrid ID3 Algorithm." International Journal of Computer Applications 64, no. 17 (February 15, 2013): 12–15. http://dx.doi.org/10.5120/10725-5656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Xiao-Ming, Cheng-Ye Ji, Wen-Jing Liu, Zhu Long, and Xiao-Yi Shen. "Levels of serum transferrin receptor and its response to Fe-supplement in Fe-deficient children." British Journal of Nutrition 96, no. 6 (December 2006): 1134–39. http://dx.doi.org/10.1017/bjn20061954.

Full text
Abstract:
The object of the present study was to investigate the levels of serum transferrin receptor (sTfR) and its response to Fe supplementation in Fe-deficient children and the role of sTfR in detecting Fe deficiency and assessing the efficacy of Fe supplementation. According to the diagnostic standard, 1006 children, aged 6–14 years in Fangshan district, Beijing, Peoples Republic of China, were divided into four groups: normal; Fe store depletion (IDs); Fe deficiency erythropoiesis (IDE); Fe deficiency anaemia (IDA). sTfR was determined and transferrin receptor-ferritin (TfR-F) index was calculated in 238 children, sixty-four normal and 174 Fe deficient. Children were administered a NaFeEDTA capsule containing 60 mg Fe once per week for the IDs and IDE groups and three times per week for the IDA group for nine consecutive weeks. The parameters reflecting Fe status and sTfR were determined before and after Fe supplementation. The levels of sTfR and TfR-F index in Fe-deficient children were significantly higher than those in the normal group. The receiver operating characteristic curve showed that sTfR has proper diagnostic efficacy for functional Fe deficiency. After Fe supplementation, the level of sTfR was significantly decreased in children with IDs, but not in children with IDE and IDA, while TfR-F index was significantly decreased in Fe-deficient children. sTfR is a reliable indicator for detecting functional Fe deficiency, and TfR-F index is a sensitive parameter for assessing the efficacy of Fe supplementation.
APA, Harvard, Vancouver, ISO, and other styles
4

Shen, Shigen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han, and Qiying Cao. "Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/179839.

Full text
Abstract:
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor nodes due to their limited resources. For this aim, we obtain optimal strategies to save IDS agents’ power, through Quantal Response Equilibrium (QRE) that is more realistic than Nash Equilibrium. A stage Intrusion Detection Game (IDG) is formulated to describe interactions between the Attacker and IDS agents. The preference structures of different strategy profiles are analyzed. Upon these structures, the payoff matrix is obtained. As the Attacker and IDS agents interact continually, the stage IDG is extended to a repeated IDG and its payoffs are correspondingly defined. The optimal strategies based on QRE are then obtained. These optimal strategies considering bounded rationality make IDS agents not always be inDefend. Sensor nodes’ power consumed in performing intrusion analyses can thus be saved. Experiment results show that the probabilities of the actions adopted by the Attacker can be predicted and thus the IDS can respond correspondingly to protect WSNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Cortese, Yvonne J., Victoria E. Wagner, Morgan Tierney, Declan Devine, and Andrew Fogarty. "Review of Catheter-Associated Urinary Tract Infections and In Vitro Urinary Tract Models." Journal of Healthcare Engineering 2018 (October 14, 2018): 1–16. http://dx.doi.org/10.1155/2018/2986742.

Full text
Abstract:
Catheter-associated urinary tract infections (CAUTIs) are one of the most common nosocomial infections and can lead to numerous medical complications from the mild catheter encrustation and bladder stones to the severe septicaemia, endotoxic shock, and pyelonephritis. Catheters are one of the most commonly used medical devices in the world and can be characterised as either indwelling (ID) or intermittent catheters (IC). The primary challenges in the use of IDs are biofilm formation and encrustation. ICs are increasingly seen as a solution to the complications caused by IDs as ICs pose no risk of biofilm formation due to their short time in the body and a lower risk of bladder stone formation. Research on IDs has focused on the use of antimicrobial and antibiofilm compounds, while research on ICs has focused on preventing bacteria entering the urinary tract or coming into contact with the catheter. There is an urgent need for in vitro urinary tract models to facilitate faster research and development for CAUTI prevention. There are currently three urinary tract models that test IDs; however, there is only a single very limited model for testing ICs. There is currently no standardised urinary tract model to test the efficacies of ICs.
APA, Harvard, Vancouver, ISO, and other styles
6

Kanakogi, Kenta, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, and Nobukazu Yoshioka. "Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques." Information 12, no. 8 (July 26, 2021): 298. http://dx.doi.org/10.3390/info12080298.

Full text
Abstract:
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of common attributes and approaches employed by adversaries to exploit known weaknesses. Due to the fact that the information in these two repositories are not linked, identifying related CAPEC attack information from CVE vulnerability information is challenging. Currently, the related CAPEC-ID can be traced from the CVE-ID using Common Weakness Enumeration (CWE) in some but not all cases. Here, we propose a method to automatically trace the related CAPEC-IDs from CVE-ID using three similarity measures: TF–IDF, Universal Sentence Encoder (USE), and Sentence-BERT (SBERT). We prepared and used 58 CVE-IDs as test input data. Then, we tested whether we could trace CAPEC-IDs related to each of the 58 CVE-IDs. Additionally, we experimentally confirm that TF–IDF is the best similarity measure, as it traced 48 of the 58 CVE-IDs to the related CAPEC-ID.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Quan, Ye-Dong Mei, Huai-Jie Yang, and Ya-Ling Tao. "Inhibitor of DNA-binding family regulates the prognosis of ovarian cancer." Future Oncology 17, no. 15 (May 2021): 1889–906. http://dx.doi.org/10.2217/fon-2020-1006.

Full text
Abstract:
Aim: The mechanistic role of inhibitor of DNA binding or differentiation (ID) family in ovarian cancer (OC) has remained unclear. Materials & methods: We used the Oncomine, GEPIA, Kaplan–Meier Plotter, cBioPortal, SurvExpress, PROGgene V2, TIMER, and FunRich to evaluate the prognostic value of IDs in patients with OC. Results: the mRNA transcripts of all IDs were markedly downregulated in OC compared with normal tissue. The prognostic value of IDs was also explored within the subtypes, pathological stages, clinical stages and TP53 mutational status. The group with low-risk IDs showed relatively good overall survival (OS) compared with the high-risk group. Conclusion: ID1/3/4 may be exploited as promising prognostic biomarkers and therapeutic targets in OC patients.
APA, Harvard, Vancouver, ISO, and other styles
8

White, Arisa. "Fake IDs." Ecotone 14, no. 1 (2019): 104–12. http://dx.doi.org/10.1353/ect.2019.0025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peters, Barry. "IDS News." Institute of Development Studies Bulletin 3, no. 1 (May 22, 2009): 37–44. http://dx.doi.org/10.1111/j.1759-5436.1970.mp3001007.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peters, Barry. "IDS NEWS." Institute of Development Studies Bulletin 3, no. 3 (May 22, 2009): 56–62. http://dx.doi.org/10.1111/j.1759-5436.1971.mp3003010.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Peters, Barry. "IDS NEWS." Institute of Development Studies Bulletin 3, no. 4 (May 22, 2009): 63–64. http://dx.doi.org/10.1111/j.1759-5436.1971.mp3004010.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chuvakin, Anton. "Monitoring IDS." Information Systems Security 12, no. 6 (January 2004): 12–16. http://dx.doi.org/10.1201/1086/44022.12.6.20040101/79781.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mujumdar, Arun S. "IDS'92." Drying Technology 10, no. 2 (March 1992): 551–52. http://dx.doi.org/10.1080/07373939208916457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

 . "IDS 2007." Tandartspraktijk 28, no. 4 (April 2007): 344. http://dx.doi.org/10.1007/bf03073115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Westgarth, David. "IDS 2023." British Dental Journal 234, no. 7 (April 14, 2023): 499. http://dx.doi.org/10.1038/s41415-023-5764-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Güntzel, M. "Die IDS ist tot — es lebe die IDS!" Der Freie Zahnarzt 59, no. 4 (March 31, 2015): 15. http://dx.doi.org/10.1007/s12614-015-5594-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Татьяна Ивановна, Смирнова,, Тумасьева, Ирина Геннадьевна, Петрова, Алла Анатольевна, and Никольский, Виктор Михайлович. "STUDY OF BIOLOGICAL ACTIVITY OF COPPER (II) COMPLEXONATES FORMED WITH MONOAMINE-TYPE COMPLEXONES." Вестник Тверского государственного университета. Серия: Химия, no. 4(50) (January 18, 2023): 143–48. http://dx.doi.org/10.26456/vtchem2022.4.17.

Full text
Abstract:
В полевых условиях исследовано влияние внекорневой обработки растворами комплексонатов меди (II) на основе иминодиуксусной кислоты (Cu-ИДУК) ииминодиянтарной кислоты (Cu-ИДЯК), а также и взятыми для сравнения растворами CuSO и свободных лигандов ИДЯК и ИДУК. Обнаружено, что применение Cu-ИДЯК в наибольшей степени по сравнению с другими вариантами опыта увеличивает содержание хлорофилла в листьях, а ликопина и β-каротина в плодах томата. In the field, the effect of out-of-root treatment with iminodiacetic acid (Cu-IDA) -iiminodisuccinic acid (Cu-IDS) -based solutions of copper (II) complexonates and CuSO and free ligand solutions of IDA and IDS were investigated. The use of Cu-IDS has been found to increase the content of chlorophyll in leaves, and lycopene and β -carotine in tomato fruits to the greatest extent compared to other test variants.
APA, Harvard, Vancouver, ISO, and other styles
18

Cruz, Tiago, Jorge Proença, Paulo Simões, Matthieu Aubigny, Moussa Ouedraogo, Antonio Graziano, and Leandros Maglaras. "A Distributed IDS for Industrial Control Systems." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 1–22. http://dx.doi.org/10.4018/ijcwt.2014040101.

Full text
Abstract:
Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domain-specific approach to cyber threat detection within ICS, which is one of the most important contributions of the CockpitCI FP7 project (http://CockpitCI.eu). Specifically, this paper will present the CockpitCI distributed Intrusion Detection System (IDS) for ICS, which provides its core cyber-detection and analysis capabilities, also including a description of its components, in terms of role, operation, integration, and remote management. Moreover, it will also introduce and describe new domain-specific solutions for ICS security such as the SCADA Honeypot and the Shadow Security Unit, which are part of the CockcpitCI IDS framework.
APA, Harvard, Vancouver, ISO, and other styles
19

Pakowski, Z. "IMPRESSIONS OF IDS'98 AS IDS COMPLETES 20 YEARS." Drying Technology 17, no. 6 (May 1999): 1247–53. http://dx.doi.org/10.1080/07373939908917611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hoffman, David A. "Get More than Cavity IDs from Your Cavity IDs." Plastics Engineering 71, no. 3 (March 2015): 42–44. http://dx.doi.org/10.1002/j.1941-9635.2015.tb01319.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Millat, G., R. Froissart, I. Maire, and D. Bozon. "IDS Transfer from Overexpressing Cells to IDS-Deficient Cells." Experimental Cell Research 230, no. 2 (February 1997): 362–67. http://dx.doi.org/10.1006/excr.1996.3435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Johnson, A. L., Morgan J. Haugen, and Dori C. Woods. "Role for Inhibitor of Differentiation/Deoxyribonucleic Acid-Binding (Id) Proteins in Granulosa Cell Differentiation." Endocrinology 149, no. 6 (March 6, 2008): 3187–95. http://dx.doi.org/10.1210/en.2007-1659.

Full text
Abstract:
Recent studies in the hen ovary have linked the initiation of granulosa cell differentiation at follicle selection to the alleviation of inhibitory MAPK signaling. The present studies assessed a role for individual inhibitor of differentiation (Id) protein isoforms as modulators of key transcriptional events occurring within granulosa cells at or immediately subsequent to differentiation. Findings from freshly collected granulosa cells collected at different stages of follicle development demonstrated a negative association between expression levels for Id2 mRNA compared with levels of Id1, Id3, and Id4. Elevated levels of Id2 are related to a differentiating/differentiated phenotype, whereas elevated Id1, Id3, and Id4 are associated with an undifferentiated phenotype. This negative relationship extends to cell signal transduction, because factors that promote inhibitory MAPK signaling (TGF-α and betacellulin) block expression of Id2 mRNA but increase levels of Id1, Id3, and Id4. Furthermore, overexpression of Gallus Id2 in cultured granulosa was found to significantly decrease levels of Id1, Id3, and Id4 mRNA but facilitate FSHR mRNA expression and, importantly, initiate LHR mRNA expression plus LH-induced progesterone production. Finally, knockdown studies using small interfering RNA specific for Id2 revealed reduced expression of FSHR and LHR mRNA and attenuated FSH- and LH-induced levels of StAR and p450 cholesterol side-chain cleavage enzyme mRNA plus progesterone production. Collectively, these data demonstrate that Id2 expression is both sufficient and necessary for increasing LHR expression and, as a result, promoting gonadotropin-induced differentiation in hen granulosa cells subsequent to follicle selection.
APA, Harvard, Vancouver, ISO, and other styles
23

Gins, Cornelia. "Hotspot IDS 2021?" ZWR - Das Deutsche Zahnärzteblatt 129, no. 11 (November 2020): 519. http://dx.doi.org/10.1055/a-1277-2261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

&NA;. "Screening IDs dysphagia." Nursing 38, no. 2 (February 2008): 34. http://dx.doi.org/10.1097/01.nurse.0000309728.28292.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Keey, Roger. "Ids'94 Awards." Drying Technology 13, no. 1-2 (January 1995): 499–501. http://dx.doi.org/10.1080/07373939508916969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Tabassum, Aliya, Aiman Erbad, Wadha Lebda, Amr Mohamed, and Mohsen Guizani. "FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning." Computer Communications 192 (August 2022): 299–310. http://dx.doi.org/10.1016/j.comcom.2022.06.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yu, Wenbin, Yiyin Wang, and Lei Song. "A Two Stage Intrusion Detection System for Industrial Control Networks Based on Ethernet/IP." Electronics 8, no. 12 (December 15, 2019): 1545. http://dx.doi.org/10.3390/electronics8121545.

Full text
Abstract:
Standard Ethernet (IEEE 802.3 and the TCP/IP protocol suite) is gradually applied in industrial control system (ICS) with the development of information technology. It breaks the natural isolation of ICS, but contains no security mechanisms. An improved intrusion detection system (IDS), which is strongly correlated to specific industrial scenarios, is necessary for modern ICS. On one hand, this paper outlines three kinds of attack models, including infiltration attacks, creative forging attacks, and false data injection attacks. On the other hand, a two stage IDS is proposed, which contains a traffic prediction model and an anomaly detection model. The traffic prediction model, which is based on the autoregressive integrated moving average (ARIMA), can forecast the traffic of the ICS network in the short term and detect infiltration attacks precisely according to the abnormal changes in traffic patterns. Furthermore, the anomaly detection model, using a one class support vector machine (OCSVM), is able to detect malicious control instructions by analyzing the key field in Ethernet/IP packets. The confusion matrix is selected to testify to the effectiveness of the proposed method, and two other innovative IDSs are used for comparison. The experiment results show that the proposed two stage IDS in this paper has an outstanding performance in detecting infiltration attacks, forging attacks, and false data injection attacks compared with other IDSs.
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Cheng-Yung, Hsiang-Yu Lin, Chih-Kuang Chuang, Po-Hsiang Zhang, Ru-Yi Tu, Shuan-Pei Lin, and Huai-Jen Tsai. "Effect of Mutated ids Overexpression on IDS Enzyme Activity and Developmental Phenotypes in Zebrafish Embryos: A Valuable Index for Assessing Critical Point-Mutations Associated with Mucopolysaccharidosis Type II Occurrence in Humans." Diagnostics 10, no. 10 (October 21, 2020): 854. http://dx.doi.org/10.3390/diagnostics10100854.

Full text
Abstract:
Mucopolysaccharidosis type II (MPS II) is an X-linked disorder resulting from a deficiency in iduronate 2-sulfatase (IDS), which is reported to be caused by gene mutations in the iduronate 2-sulfatase (IDS) gene. Many IDS mutation sites have not yet had their causal relationship with MPS II characterized. We employed a gain-of-function strategy whereby we microinjected different mutated zebrafish ids (z-ids) mRNAs corresponded to human IDS gene into zebrafish embryos, and then measured their total IDS enzymatic activity and observed the occurrence of defective phenotypes during embryonic development. We examined three known mutation sites for human IDS genes (h-IDS) associated with MPS II symptoms, including h-IDS-P86L, -S333L and -R468W, which corresponded to z-ids-P80L, -S327L and -R454W. When these three mutated z-ids mRNAs were overexpressed in zebrafish embryos, the IDS enzymatic activity of the total proteins extracted from the injected embryos was not increased compared with the endogenous IDS of the untreated embryos, which suggests that the IDS enzymatic activity of these three mutated z-ids was totally lost, as expected. Additionally, we observed defective phenotypes in these injected embryos, resulting from the failed IDS enzyme breakdown, which, in turn, has a dominant negative effect on the endogenous wild-type IDS function. These phenotypes were similar to the clinical symptoms observed in MPS II pathogenesis. We further studied six uncharacterized IDS mutation sites as identified by the Taiwanese MPS newborn screening programs. We propose a novel IDS enzyme activity assay combined with phenotypic observation in zebrafish embryos, as an alternative platform for quickly providing a valuable index for preliminarily assessment of any identified IDS point mutation gene that has not yet been characterized, in the context of its role in MPS II development.
APA, Harvard, Vancouver, ISO, and other styles
29

Cokesa, Z̆eljko, Hans-Joachim Knackmuss, and Paul-Gerhard Rieger. "Biodegradation of All Stereoisomers of the EDTA Substitute Iminodisuccinate by Agrobacterium tumefaciens BY6 Requires an Epimerase and a Stereoselective C-N Lyase." Applied and Environmental Microbiology 70, no. 7 (July 2004): 3941–47. http://dx.doi.org/10.1128/aem.70.7.3941-3947.2004.

Full text
Abstract:
ABSTRACT Biodegradation tests according to Organization for Economic Cooperation and Development standard 301F (manometric respirometry test) with technical iminodisuccinate (IDS) revealed ready biodegradability for all stereoisomers of IDS. The IDS-degrading strain Agrobacterium tumefaciens BY6 was isolated from activated sludge. The strain was able to grow on each IDS isomer as well as on Fe2+-, Mg2+-, and Ca2+-IDS complexes as the sole carbon, nitrogen, and energy source. In contrast, biodegradation of and growth on Mn2+-IDS were rather scant and very slow on Cu2+-IDS. Growth and turnover experiments with A. tumefaciens BY6 indicated that the isomer R,S-IDS is the preferred substrate. The IDS-degrading enzyme system isolated from this organism consists of an IDS-epimerase and a C-N lyase. The C-N lyase is stereospecific for the cleavage of R,S-IDS, generating d-aspartic acid and fumaric acid. The decisive enzyme for S,S-IDS and R,R-IDS degradation is the epimerase. It transforms S,S-IDS and R,R-IDS into R,S-IDS. Both enzymes do not require any cofactors. The two enzymes were purified and characterized, and the N-termini were sequenced. The purified lyase and also the epimerase catalyzed the transformation of alkaline earth metal-IDS complexes, while heavy metal-IDS complexes were transformed rather slowly or not at all. The observed mechanism for the complete mineralization of all IDS isomers involving an epimerase offers an interesting possibility of funneling all stereoisomers into a catabolic pathway initiated by a stereoselective lyase.
APA, Harvard, Vancouver, ISO, and other styles
30

Rush, A. John, Thomas Carmody, and Paul-Egbert Reimitz. "The Inventory of Depressive Symptomatology (IDS): Clinician (IDS-C) and Self-Report (IDS-SR) ratings of depressive symptoms." International Journal of Methods in Psychiatric Research 9, no. 2 (June 2000): 45–59. http://dx.doi.org/10.1002/mpr.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Corruble, E., J. M. Legrand, C. Duret, H. Zvenigorowski, and J. D. Guelfi. "IDS-C and IDS-SR: Psychometric properties in depressed in-patients." European Neuropsychopharmacology 8 (November 1998): S136. http://dx.doi.org/10.1016/s0924-977x(98)80129-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Corruble, E., J. M. Legrand, C. Duret, G. Charles, and J. D. Guelfi. "IDS-C and IDS-SR: Psychometric properties in depressed in-patients." Journal of Affective Disorders 56, no. 2-3 (December 1999): 95–101. http://dx.doi.org/10.1016/s0165-0327(99)00055-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Junwon, Kabsun Kim, Jung Ha Kim, Hye Mi Jin, Han Kyung Choi, Seoung-Hoon Lee, Hyun Kook, et al. "Id helix-loop-helix proteins negatively regulate TRANCE-mediated osteoclast differentiation." Blood 107, no. 7 (April 1, 2006): 2686–93. http://dx.doi.org/10.1182/blood-2005-07-2798.

Full text
Abstract:
AbstractTumor necrosis factor (TNF)–related activation-induced cytokine (TRANCE) induces osteoclast formation from monocyte/macrophage lineage cells via various transcription factors, including the Mi transcription factor (Mitf). Here, we show that inhibitors of differentiation/DNA binding (Ids), helix-loop-helix (HLH) transcription factors, negatively regulate TRANCE-induced osteoclast differentiation. Expression levels of Id1, Id2, and Id3 genes are significantly reduced by TRANCE during osteoclastogenesis. Interestingly, overexpression of the 3 Id genes in bone marrow–derived monocyte/macrophage lineage cells (BMMs) inhibits the formation of tartrate-resistant acid phosphatase (TRAP)–positive multinuclear osteoclasts, but it does not alter the ability of BMMs to either phagocytose or differentiate into dendritic cells (DCs). Overexpression of Id2 in BMMs attenuates the gene induction of nuclear factor of activated T cells c1 (NFATc1) and osteoclast-associated receptor (OSCAR) during TRANCE-mediated osteoclastogenesis. Furthermore, Id proteins interact with Mitf, a basic HLH (bHLH) transcription factor, and inhibit its transactivation of OSCAR, which is a costimulatory receptor expressed by osteoclast precursors, by attenuating the DNA binding ability of Mitf to the E-box site of the OSCAR promoter. Taken together, our results reveal both a new facet of negative regulation, mediated by Id proteins, as well as the mechanism whereby TRANCE signaling overcomes it, allowing osteoclastogenesis to proceed.
APA, Harvard, Vancouver, ISO, and other styles
34

Cao, Yixin, Lei Zhang, Xiaosong Zhao, Kai Jin, and Ziyi Chen. "An Intrusion Detection Method for Industrial Control System Based on Machine Learning." Information 13, no. 7 (July 3, 2022): 322. http://dx.doi.org/10.3390/info13070322.

Full text
Abstract:
The integration of communication networks and the internet of industrial control in Industrial Control System (ICS) increases their vulnerability to cyber attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDS) largely rely on predefined models and are trained mostly on specific cyber attacks, which means the traditional IDS cannot cope with unknown attacks. Additionally, most IDS do not consider the imbalanced nature of ICS datasets, thus suffering from low accuracy and high False Positive Rates when being put to use. In this paper, we propose the NCO–double-layer DIFF_RF–OPFYTHON intrusion detection method for ICS, which consists of NCO modules, double-layer DIFF_RF modules, and OPFYTHON modules. Detected traffic will be divided into three categories by the double-layer DIFF_RF module: known attacks, unknown attacks, and normal traffic. Then, the known attacks will be classified into specific attacks by the OPFYTHON module according to the feature of attack traffic. Finally, we use the NCO module to improve the model input and enhance the accuracy of the model. The results show that the proposed method outperforms traditional intrusion detection methods, such as XGboost and SVM. The detection of unknown attacks is also considerable. The accuracy of the dataset used in this paper reaches 98.13%. The detection rates for unknown attacks and known attacks reach 98.21% and 95.1%, respectively. Moreover, the method we proposed has achieved suitable results on other public datasets.
APA, Harvard, Vancouver, ISO, and other styles
35

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Full text
Abstract:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Ching-Jen, Shayan Moosa, Dale Ding, Daniel M. Raper, Rebecca M. Burke, Cheng-Chia Lee, Srinivas Chivukula, et al. "Infundibular dilations of the posterior communicating arteries: pathogenesis, anatomical variants, aneurysm formation, and subarachnoid hemorrhage." Journal of NeuroInterventional Surgery 8, no. 8 (June 18, 2015): 791–95. http://dx.doi.org/10.1136/neurintsurg-2015-011827.

Full text
Abstract:
BackgroundCerebrovascular infundibular dilations (IDs) are triangular-shaped widenings less than 3 mm in diameter, which are most commonly found at the posterior communicating artery (PCoA). The aims of this systematic review are to elucidate the natural histories of IDs, determine their risk of progression to significant pathology, and discuss potential management options.MethodsA comprehensive literature search of PubMed was used to find all case reports and series relating to cerebral IDs. IDs were classified into three types: type I IDs do not exhibit morphological change over a long follow-up period, type II IDs evolve into saccular aneurysms, while type III IDs are those that result in subarachnoid hemorrhage without prior aneurysmal progression. Data were extracted from studies that demonstrated type II or III IDs.ResultsWe reviewed 16 cases of type II and seven cases of type III IDs. For type II IDs, 81.3% of patients were female with a median age at diagnosis of 38. All type II IDs were located at the PCoA without a clear predilection for sidedness. Median time to aneurysm progression was 7.5 years. For type III IDs there was no clear gender preponderance and the median age at diagnosis was 51. The PCoA was involved in 85.7% of cases, with 57.1% of IDs occurring on the left. Most patients were treated with clipping. Risk factors for aneurysm formation appear to be female gender, young age, left-sided localization, coexisting aneurysms, and hypertension.ConclusionsIDs can rarely progress to aneurysms or rupture. Young patients with type II or III IDs with coexisting aneurysms or hypertension may benefit from long-term imaging surveillance.
APA, Harvard, Vancouver, ISO, and other styles
37

Ulrich, Peter G. "MedClone & Anti-Ids." Nature Biotechnology 10, no. 12 (December 1992): 1505. http://dx.doi.org/10.1038/nbt1292-1505b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

swari, M. Jagadhee, and M. Anand Kumar. "Genetic Anomaly Based Ids." International Journal of Computer Science and Engineering 4, no. 3 (March 25, 2017): 14–16. http://dx.doi.org/10.14445/23488387/ijcse-v4i3p104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Stephenson, Peter. "Where Is the IDS?" Information Systems Security 8, no. 4 (January 2000): 1–6. http://dx.doi.org/10.1201/1086/43307.8.4.20000101/31075.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Denne, Laura. "Highlights of IDS 2007." Dental Nursing 3, no. 4 (May 2007): 206–7. http://dx.doi.org/10.12968/denn.2007.3.4.29700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Schneider, Daniel K. "INTELLIGENT DISCOVERY SYSTEMS (IDS)." Higher Education in Europe 14, no. 2 (January 1989): 40–45. http://dx.doi.org/10.1080/0379772890140205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Pandit, Shikha, and Poo ja. "IDS in Cloud Environment." International Journal of Computer Trends and Technology 11, no. 5 (May 25, 2014): 228–30. http://dx.doi.org/10.14445/22312803/ijctt-v11p148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Valette, Jean-Jacques, Frank G. Lemoine, Pascale Ferrage, Philippe Yaya, Zuheir Altamimi, Pascal Willis, and Laurent Soudarin. "IDS contribution to ITRF2008." Advances in Space Research 46, no. 12 (December 2010): 1614–32. http://dx.doi.org/10.1016/j.asr.2010.05.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Edwards, Lincoln A., and Howard A. Fine. "The Ids Have It." Cancer Cell 18, no. 6 (December 2010): 543–45. http://dx.doi.org/10.1016/j.ccr.2010.11.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Grolier, Jean-Pierre E. "IDS+TOM+DISQUAC=HVK." Journal of Solution Chemistry 20, no. 1 (January 1991): 1–2. http://dx.doi.org/10.1007/bf00651635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

A, Lesti Herawati, and Rolando A. "INTEGRATED DEWATERING SYSTEM (IDS)." Prosiding Temu Profesi Tahunan PERHAPI 1, no. 1 (March 29, 2020): 705–14. http://dx.doi.org/10.36986/ptptp.v1i1.112.

Full text
Abstract:
ABSTRAK Dalam bisnis proses penambangan batubara dengan metode penambangan Open Pit Mining, dewatering menjadi salah satu kunci sukses keberhasilan operasional penambangan. Oleh karena itu proses perencanaan, eksekusi, monitoring dan evaluasi dewatering wajib dilaksanakan dengan baik. Sebagai salah satu aktivitas kritikal, dewatering memerlukan proses monitoring yang baik untuk mencapai Excellence Dewatering dan cost dewatering yang efisien. Terlebih di era digital seperti saat ini, proses monitoring dewatering yang real time, cepat, akurat, komprehensif dan terintegrasi mutlak diperlukan. Digitalisasi monitoring dewatering dengan “Integrated Dewatering System” (IDS) menjadi solusi atas challenge untuk monitoring dewatering yang excellence. Integrated Dewatering System (IDS) : Suatu sistem Dewatering yang terintegrasi dalam pengumpulan, pengolahan & penyajian data secara real time sehingga dapat digunakan sebagai dasar analisa & pengambilan keputusan yang cepat & tepat guna mewujudkan tambang No Flood dengan Cost Dewatering yang efisien. Cakupan area monitoring IDS meliputi : curah hujan, sump, pompa. Hardware IDS yaitu : Weather Station alat untuk mengukur curah hujan, durasi hujan, frekuensi hujan secara real time; 2) Automatic Flowmeter alat untuk mengukur debit pompa secara otomatis dan real time; 3) Automatic Water Level alat untuk mengukur elevasi sump (area tampungan air di pit), sehingga elevasi sump dapat dimonitor secara real time. Secara umum proses monitoring Dewatering dengan IDS adalah sebagai berikut : weather station mengukur curah hujan (mm), durasi hujan (menit), frekuensi hujan, data curah hujan kemudian dilakukan proses perhitungan untuk menghitung volume run off yang masuk ke tambang, air yang masuk ke dalam sump secara berkesinambungan dipompa, debit pemompaan diukur dengan menggunakan automatic flowmeter, selanjutnya automatic water level mengukur elevasi sump, kemudian sistem akan mengolah data-data output dalam software IDS yang kemudian menyampaikan Alert melalui media mobile phone informasi status sump sebagai Early Warning untuk memberikan “guidance corrective action” terhadap kondisi dewatering yang terjadi. Manfaat dari IDS yaitu : 1) Proses monitoring curah hujan, debit pompa dan elevasi air lebih cepat, mudah; 2) Data monitoring Dewatering akurat dan terintegrasi; 3) Memberikan Early Warning terhadap status sump sehingga corrective action yang tepat dan cepat dapat segera dilaksanakan; 4) Mencegah tambang Flood dengan corrective action yang cepat, 5) Meningkatkan aspek Safety karena high risk activity berkurang; 6) Cost dewatering efisien dengan operasional pompa (debit, Rotary Per Minutes, Utilization Availability) yang optimum. Kata kunci : IDS, weather station, automatic flowmeter, automatic water level ABSTRACT In the business of coal mining using the Open Pit Mining method, dewatering is one of the keys to the success of mining operations. Therefore the process of planning, execution, monitoring and evaluation of dewatering must be carried out properly. As one of the critical activities, dewatering requires a good monitoring process to achieve Excellence Dewatering and cost-efficient dewatering. Especially in the digital era as it is today, real-time, fast, accurate, comprehensive and integrated dewatering monitoring process is absolutely necessary. The digitization of dewatering monitoring with the "Integrated Dewatering System" (IDS) is the solution to the challenge for excellence dewatering monitoring. Integrated Dewatering System (IDS): A Dewatering system that is integrated in the collection, processing & presentation of data in real time so that it can be used as a basis for analysis & decision making that is fast & precise in order to realize the No Flood mine with an efficient Cost Dewatering. The scope of the IDS monitoring area includes: rainfall, sumps, pumps. IDS hardware namely: 1) Weather Station tool to measure rainfall, duration of rain, frequency of rain in a Manner real time; 2) Automatic Flowmeter tool to measure pump flow automatically and in real time; 3) Automatic Water Level tool to measure the elevation of the sump (water catchment area in the pit), so that the sump elevation can be monitored in real time. In general the Dewatering monitoring process with IDS is as follows: weather station measures rainfall (mm), duration of rain (minutes), frequency of rainfall, rainfall data then the calculation process is carried out to calculate the volume of run-off entering the mine, water entering in a sump continuously pumped, pumping discharge is measured using automatic flowmeter, then automatic water level measures the elevation of the sump, then the system will process the output data in the IDS software which then conveys the "Alert" through the mobile phone media sump status information as an Early Warning for provide "guidance corrective action" for conditions of dewatering that occur. Benefits of IDS are: 1) The process of monitoring rainfall, pump discharge and water elevation is faster, easier; 2) Dewatering monitoring data is accurate and integrated; 3) Give an Early Warning on the status of the sump so that corrective action is appropriate and quickly can be implemented immediately; 4) Prevent Flood mining with fast corrective action; 5) Improve the Safety aspect because of the reduced high risk activity; 6) Cost-efficient dewatering with pump operations (discharge, Rotary Per Minutes,Utilization Availability) is optimum. Keywords: IDS, weather station, automatic flow meter, automatic water level
APA, Harvard, Vancouver, ISO, and other styles
47

Mujumdar, Arun S. "HIGHLIGHTS OF IDS'92." Drying Technology 11, no. 2 (January 1993): 423–24. http://dx.doi.org/10.1080/07373939308916834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Baraniuk, Chris. "AI ‘finprinting’ IDs sharks." New Scientist 232, no. 3095 (October 2016): 24. http://dx.doi.org/10.1016/s0262-4079(16)31888-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Levy Rocha, Savio, Fabio Lucio Lopes de Mendonca, Ricardo Staciarini Puttini, Rafael Rabelo Nunes, and Georges Daniel Amvame Nze. "DCIDS—Distributed Container IDS." Applied Sciences 13, no. 16 (August 16, 2023): 9301. http://dx.doi.org/10.3390/app13169301.

Full text
Abstract:
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security risks that are increasingly exploited. New technologies like container platforms require IDS to evolve to effectively detect intrusive activities in these environments, and advancements in this regard are still necessary. In this context, this work proposes a framework for implementing an IDS focused on container platforms using machine learning techniques for anomaly detection in system calls. We contribute with the ability to build a dataset of system calls and share it with the community; the generation of anomaly detection alerts in open-source applications to support the SOC through the analysis of these system calls; the possibility of implementing different machine learning algorithms and approaches to detect anomalies in system calls (such as frequency, sequence, and arguments among other type of data) aiming greater detection efficiency; and the ability to integrate the framework with other tools, improving collaborative security. A five-layer architecture was built using free tools and tested in a corporate environment emulated in the GNS3 software version 2.2.29. In an experiment conducted with a public system call dataset, it was possible to validate the operation and integration of the framework layers, achieving detection results superior to the work that originated the dataset.
APA, Harvard, Vancouver, ISO, and other styles
50

Gill, Komal Singh, Sharad Saxena, and Anju Sharma. "GTA-IDS: Game Theoretic Approach to Enhance IDS Detection in Cloud Environment." Computing and Informatics 41, no. 3 (2022): 665–88. http://dx.doi.org/10.31577/cai_2022_3_665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography