Results 81 to 90 of about 8,304,922 (298)

DEVELOPMENT OF INFORMATION SECURITY INSIDER THREAT CLASSIFICATION USING INCIDENT CLUSTERING

open access: yesБезопасность информационных технологий, 2016
Effective information security insider threat countermeasure requires knowledge and understanding of actual insider threats and methods of their realization.
A. S. Zaitsev, A. A. Malyuk
doaj  

Fake News Detection Model Basing on Machine Learning Algorithms

open access: yesمجلة بغداد للعلوم
The rapid growth of the internet and easy communication has made it quick and simple to create and spread news. Social media users now generate and share more information than before, but some of it is false and unrelated to reality.
Mohammed A. Taha   +2 more
doaj   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Adjoint-based spatially distributed calibration of a grid GR-based parsimonious hydrological model over 312 French catchments with SMASH platform [PDF]

open access: gold, 2022
François Colléoni   +4 more
openalex   +1 more source

Gröbner bases, H–bases and interpolation [PDF]

open access: yesTransactions of the American Mathematical Society, 2000
The paper is concerned with a construction for H–bases of polynomial ideals without relying on term orders. The main ingredient is a homogeneous reduction algorithm which orthogonalizes leading terms instead of completely canceling them. This allows for an extension of Buchberger’s algorithm to construct these H–bases algorithmically.
openaire   +2 more sources

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

About the name and titles of Genghis Khan

open access: yesНовые исследования Тувы, 2016
Article considers the origin and semantics of the name and titles of Genghis Khan. Basing on the analysis of steppe titles it substantiates the opinion that Genghis is a personal name-title that never again appears as title.
Nurlan J. Mynbaev
doaj  

Home - About - Disclaimer - Privacy