Results 111 to 120 of about 1,164,549 (348)
Simulation and evaluation of latent heat thermal energy storage [PDF]
The relative value of thermal energy storage (TES) for heat pump storage (heating and cooling) as a function of storage temperature, mode of storage (hotside or coldside), geographic locations, and utility time of use rate structures were derived ...
Sigmon, T. W.
core +1 more source
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core +1 more source
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
Application of Computer-aided Rehabilitation
With the rapid development of computer computing technology, big data, artificial intelligence and cloud computing, the application of computer in the field of rehabilitation medicine is more and more extensive.
Zhuoming CHEN
doaj
INTEGRATING CLOUD TECHNOLOGIES IN THE BUSINESS ENVIRONMENT [PDF]
Starting from the definition of cloud computing, literally "Computerization in the clouds", as a modern concept in the field of computers and informatics and representing a distributed set of computing, application, access to information and data ...
CARINA-ELENA STEGĂROIU
doaj
Secure Storage of Computer Network Data based on Cloud Computing
Hongwei Jiang
openalex +2 more sources
Ensuring Data Storage Security in Cloud Computing
Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive ...
openaire +1 more source
Digital overlaying of the universal transverse Mercator grid with LANDSAT data derived products [PDF]
Picture elements of data from the LANDSAT multispectral scanner are correlated with the universal tranverse Mercator grid. In the procedure, a series of computer modules was used to make approximations of universal transverse Mercator grid locations for ...
Graham, M. H.
core +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken +7 more
wiley +1 more source

