Results 101 to 110 of about 7,761,143 (347)
Traffic Prediction and Random Access Control Optimization: Learning and Non-learning based Approaches [PDF]
Random access schemes in modern wireless communications are generally based on the framed-ALOHA (f-ALOHA), which can be optimized by flexibly organizing devices' transmission and re-transmission. However, this optimization is generally intractable due to the lack of information about complex traffic generation statistics and the occurrence of the ...
arxiv
ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT [PDF]
Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point
Perepa, Mallika
core +1 more source
α2 → 8 polysialic acid elicits poor immunogenicity. Small‐angle scattering shows a supramolecular structure with parallel‐chain binding, although in different forms at μm and mm calcium. The major histocompatibility complex requires molecular weights around 2000 Da to produce antibodies, and 2000 Da polysialic oligomers will bind in these structures ...
Kenneth A. Rubinson
wiley +1 more source
High-resolution spatio-temporal risk mapping for malaria in Namibia: a comprehensive analysis
Background Namibia, a low malaria transmission country targeting elimination, has made substantial progress in reducing malaria burden through improved case management, widespread indoor residual spraying and distribution of insecticidal nets.
Song Zhang+16 more
doaj +1 more source
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma+8 more
wiley +1 more source
Role-Based Access Controls [PDF]
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many ...
arxiv
The power of microRNA regulation—insights into immunity and metabolism
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto+2 more
wiley +1 more source
Background After almost 70 years of using indoor residual spraying (IRS) as the primary intervention for malaria vector control, the Republic of Panama wanted to evaluate the operational feasibility and acceptability of distributing long-lasting ...
A. Oscar E. González+9 more
doaj +1 more source
Improving HIV testing efficiency saves financial and material resources for health. We conducted a secondary data analysis of routinely collected HIV risk-screening program data in Uganda, from October to November 2019, to determine the performance ...
Marvin Lubega+10 more
doaj +1 more source
Trust Management in Decentralized IoT Access Control System [PDF]
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes ...
arxiv