Results 71 to 80 of about 1,164,549 (348)
Design and Implementation of Computer Hardware Monitoring System Based on Cloud Computing
From the perspective of customer service and on the basis of network, this paper proposes a computer hardware monitoring system based on cloud platform, which separates the data acquisition, storage, and analysis based on cloud computing hardware ...
Liu Ming, Guo Ping
doaj +1 more source
Following high dose rate brachytherapy (HDR‐BT) for hepatocellular carcinoma (HCC), patients were classified as responders and nonresponders. Post‐therapy serum induced increased BrdU incorporation and Cyclin E expression of Huh7 and HepG2 cells in nonresponders, but decreased levels in responders.
Lukas Salvermoser +14 more
wiley +1 more source
PERANCANGAN DAN IMPLEMENTASI DATA LOSS PREVENTION SYSTEM DENGAN MENGGUNAKAN NETWORK ATTACHED STORAGE
There was no denying the data security issues deserved to be become a problem that must be solved. Data is one of thing which has become a reference for people to take a decision. Currently most of companies, colleges, and other institutions also rely on
Defni, S.Si, M.Kom, Cipto Prabowo, MT
doaj +1 more source
Rekayasa Router untuk Penyimpanan Data [PDF]
Data communication is the process by which a resource on a computer can be used by other computers on the condition that the second computer is already connected to a communications network. To connect the computer to the router so the need for different
Kusumaningrum, A. (Anggraini) +1 more
core
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Guaranteeing Data Storage Security in Cloud Computing
Cloud Computing has been imagined as the next generation structural engineering of IT Enterprise. .By using the homomorphic token with dispersed verification of eradication coded information, our plan attains to the combination of capacity rightness protection and information blunder limitation, i.e., the identification of getting rowdy server(s).
Viswanath Aiyer +3 more
openaire +1 more source
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié +16 more
wiley +1 more source
Data Storage Issues in Cloud Computing
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud.
openaire +1 more source
User's guide for CCT2WA (converting CCT's to work-addressable file) [PDF]
The CCT2WA program, developed to convert the shuttle post-flight computer compatible tape data to a word addressable mass storage file, is described. The use of utility processors that can be used to copy word addressable files from mass storage to mass ...
Hackler, D. B., Williams, S. D.
core +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source

