Results 61 to 70 of about 3,793,287 (374)

Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the booming of cloud-based digital twin systems, monitoring key performance indicators has become crucial for ensuring system security and reliability.
Zicong Miao, Weize Li, Xiaodong Pan
doaj   +1 more source

A Recursive Solution to the Global Maximum Minimum Cut Problem with a Fixed Sink

open access: yesAlgorithms
In graph theory and network design, the minimum cut is a fundamental measure of system connectivity and communication capacity. While prior research has largely focused on computing the minimum cut for a fixed source–sink pair, practical scenarios such ...
Xiaoyao Huang, Shuo Quan, Jie Wu
doaj   +1 more source

An integrative decision-making framework to guide policies on regulating ChatGPT usage [PDF]

open access: yesPeerJ Computer Science
Generative artificial intelligence has created a moment in history where human beings have begin to closely interact with artificial intelligence (AI) tools, putting policymakers in a position to restrict or legislate such tools.
Umar Ali Bukar   +4 more
doaj   +2 more sources

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

A parallel algorithm for network traffic anomaly detection based on Isolation Forest

open access: yesInternational Journal of Distributed Sensor Networks, 2018
With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic
Xiaoling Tao   +4 more
doaj   +1 more source

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

open access: yesIEEE Access, 2016
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires
Suleman Khan   +12 more
doaj   +1 more source

Review of the environmental and organisational implications of cloud computing: final report. [PDF]

open access: yes, 2010
Cloud computing – where elastic computing resources are delivered over the Internet by external service providers – is generating significant interest within HE and FE.
Breslin, C., MacDonald, A., McDonald, D.
core  

SNUPN‐Related Muscular Dystrophy: Novel Phenotypic, Pathological and Functional Protein Insights

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective SNUPN‐related muscular dystrophy or LGMDR29 is a new entity that covers from a congenital or childhood onset pure muscular dystrophy to more complex phenotypes combining neurodevelopmental features, cataracts, or spinocerebellar ataxia. So far, 12 different variants have been described.
Nuria Muelas   +18 more
wiley   +1 more source

An improved EAE-DETR model for defect detection of server motherboard

open access: yesScientific Reports
This study addresses the challenges of missed and false detections in server motherboard defect identification, which arise from factors such as small target size, positional rotation deviations, and uneven scale distribution.
Jian Chi   +4 more
doaj   +1 more source

Fog-Aware Hierarchical Autoencoder with Density-Based Clustering for AI-Driven Threat Detection in Smart Farming IoT Systems

open access: yesFuture Internet
Smart farming relies heavily on IoT automation and data-driven decision making, but this growing connectivity also increases exposure to cyberattacks.
Manikandan Thirumalaisamy   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy