Results 101 to 110 of about 7,761,143 (347)

Traffic Prediction and Random Access Control Optimization: Learning and Non-learning based Approaches [PDF]

open access: yesarXiv, 2020
Random access schemes in modern wireless communications are generally based on the framed-ALOHA (f-ALOHA), which can be optimized by flexibly organizing devices' transmission and re-transmission. However, this optimization is generally intractable due to the lack of information about complex traffic generation statistics and the occurrence of the ...
arxiv  

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT [PDF]

open access: yes, 2013
Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point
Perepa, Mallika
core   +1 more source

The solution supramolecular structure of α2 → 8 polysialic acid suggests a structural cause for its low immunogenicity

open access: yesFEBS Letters, EarlyView.
α2 → 8 polysialic acid elicits poor immunogenicity. Small‐angle scattering shows a supramolecular structure with parallel‐chain binding, although in different forms at μm and mm calcium. The major histocompatibility complex requires molecular weights around 2000 Da to produce antibodies, and 2000 Da polysialic oligomers will bind in these structures ...
Kenneth A. Rubinson
wiley   +1 more source

High-resolution spatio-temporal risk mapping for malaria in Namibia: a comprehensive analysis

open access: yesMalaria Journal
Background Namibia, a low malaria transmission country targeting elimination, has made substantial progress in reducing malaria burden through improved case management, widespread indoor residual spraying and distribution of insecticidal nets.
Song Zhang   +16 more
doaj   +1 more source

Refining the NaV1.7 pharmacophore of a class of venom‐derived peptide inhibitors via a combination of in silico screening and rational engineering

open access: yesFEBS Letters, EarlyView.
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma   +8 more
wiley   +1 more source

Role-Based Access Controls [PDF]

open access: yes15th National Computer Security Conference, Baltimore, MD. October 13-16, 1992, 2009
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many ...
arxiv  

The power of microRNA regulation—insights into immunity and metabolism

open access: yesFEBS Letters, EarlyView.
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto   +2 more
wiley   +1 more source

Pilot introduction of long-lasting insecticidal nets and hammock nets in the indigenous Comarca of Guna Yala, Panama

open access: yesMalaria Journal
Background After almost 70 years of using indoor residual spraying (IRS) as the primary intervention for malaria vector control, the Republic of Panama wanted to evaluate the operational feasibility and acceptability of distributing long-lasting ...
A. Oscar E. González   +9 more
doaj   +1 more source

Risk Screening Tools Could Potentially Miss HIV-Positive Individuals Who Seek Testing Services: A Secondary Program Data Analysis on the Performance Characteristics of an Adolescent and Adult HIV Risk Screening Tool in Uganda

open access: yesTropical Medicine and Infectious Disease
Improving HIV testing efficiency saves financial and material resources for health. We conducted a secondary data analysis of routinely collected HIV risk-screening program data in Uganda, from October to November 2019, to determine the performance ...
Marvin Lubega   +10 more
doaj   +1 more source

Trust Management in Decentralized IoT Access Control System [PDF]

open access: yesarXiv, 2019
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes ...
arxiv  

Home - About - Disclaimer - Privacy