Results 61 to 70 of about 1,170,289 (309)

Design and Implementation of Computer Hardware Monitoring System Based on Cloud Computing

open access: yesMATEC Web of Conferences, 2016
From the perspective of customer service and on the basis of network, this paper proposes a computer hardware monitoring system based on cloud platform, which separates the data acquisition, storage, and analysis based on cloud computing hardware ...
Liu Ming, Guo Ping
doaj   +1 more source

Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods

open access: yesLontar Komputer, 2018
The rapid development of computer technology in hardware, is currently developing non-volatile computer storage media Solid State Drive (SSD). SSD technology has a faster data access speed than Hard Disk and is currently starting to replace Hard Disk ...
Imam Riadi   +2 more
doaj   +1 more source

Enhance Data Integrity For Data Storage In Cloud Computing

open access: yesInternational Journal of Engineering & Technology, 2018
In this paper, a well secured and effective AES based framework is proposed for proposed for evaluating individual records put away at the untrusted server. The gadget guarantees the of certainties respectability and accessibility. The gadget bolsters open reviewing with the guide of using TPA and privateness holding by a method for not releasing the ...
Maddhukuri. Shiva Krishna   +2 more
openaire   +2 more sources

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

Corrigendum: Educational Data Mining Techniques for Student Performance Prediction: Method Review and Comparison Analysis

open access: yesFrontiers in Psychology, 2022
Yupei Zhang   +11 more
doaj   +1 more source

Specific feature recognition on group specific networks (SFR-GSN): a biomarker identification model for cancer stages

open access: yesFrontiers in Genetics
Background and ObjectiveAccurate identification of cancer stages is challenging due to the complexity and heterogeneity of the disease. Current clinical diagnosis methods primarily rely on phenotypic observations, which may not capture early molecular ...
Bolin Chen   +9 more
doaj   +1 more source

pH‐mediated activation of the lysosomal arginine sensor SLC38A9

open access: yesFEBS Letters, EarlyView.
Cells monitor nutrient levels via the lysosomal transporter SLC38A9 to activate the mechanistic target of rapamycin complex 1 (mTORC1). This study reveals that SLC38A9 function is regulated by pH. We identified histidine 544 as a critical pH sensor that undergoes conformational changes to control amino acid efflux from lysosomes; therefore, it ...
Xuelang Mu, Ampon Sae Her, Tamir Gonen
wiley   +1 more source

Resource Storage Management Model For Ensuring Quality Of Service In The Cloud Archive Systems

open access: yesComputer Science, 2014
Nowadays, service providers offer a lot of IT services in the public or private cloud. The client can buy various kinds of services like SaaS, PaaS, etc. Recently there was introduced Backup as a Service (BaaS) as a variety of SaaS.
Mariusz Kapanowski   +2 more
doaj   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

PERANCANGAN DAN IMPLEMENTASI DATA LOSS PREVENTION SYSTEM DENGAN MENGGUNAKAN NETWORK ATTACHED STORAGE

open access: yesJurnal Teknoif Teknik Informatika Institut Teknologi Padang, 2013
There was no denying the data security issues deserved to be become a problem that must be solved. Data is one of thing which has become a reference for people to take a decision. Currently most of companies, colleges, and other institutions also rely on
Defni, S.Si, M.Kom, Cipto Prabowo, MT
doaj   +1 more source

Home - About - Disclaimer - Privacy