Results 71 to 80 of about 4,221,254 (369)
PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [PDF]
The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness of the documents.However,attackers can adopt high obfuscation ...
SONG Enzhou, HU Tao, YI Peng, WANG Wenbo
doaj +1 more source
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva +5 more
wiley +1 more source
Theoretical Analysis and Empirical Evaluation of Coverage Indictors for Closed Source APP Testing
The number of mobile applications has increased geometrically nowadays, but how to ensure their quality and conduct adequate and effective testing is still a challenge for developers.
Sen Yang, Song Huang, Zhanwei Hui
doaj +1 more source
The Affordable Care Act’s (ACA) Employer Shared Responsibility Determination and the Potential Employer Penalty [PDF]
[Excerpt] The Patient Protection and Affordable Care Act (ACA; P.L. 111-148, as amended) expanded insurance coverage in the United States through its “shared responsibility” provisions: Employers either provide health coverage or face potential employer ...
Whittaker, Julie M
core +1 more source
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Due to the incremental and iterative nature of the software testing process, a test suite may become bloated with redundant, overlapping, and similar test cases.
Ziad A. Al-Sharif, Clinton L. Jeffery
doaj +1 more source
The analysis of test coverage using mutation operator BSR [PDF]
Code coverage is a measure used to describe the degree to which the source code of a program or paths through the program has been tested by a particular test suite.
Murn, Damjan
core +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
In this study, a dual‐function radar‐communications (DFRC) system based on the circulating code array is presented to address the contradiction between radar and communications system in beam scanning and beam coverage.
Yu Zhou +4 more
doaj +1 more source

