Results 41 to 50 of about 2,694,917 (322)

Problem-based learning as an effective tool for teaching computer network design [PDF]

open access: yes, 2006
This paper addresses the challenge of developing techniques for the effective teaching of computer network design. It reports on the experience of using the technique of problem-based learning as a key pedagogical method for teaching practical network ...
Linge, N, Parsons, DJ
core   +2 more sources

Mitochondrial fatty acid oxidation is stimulated by red light irradiation

open access: yesFEBS Letters, EarlyView.
Light at different wavelengths has distinct effects on keratinocyte viability and metabolism. UVA light abrogates metabolic fluxes. Blue and green light have no effect on metabolic fluxes, while red light enhanced oxidative phosphorylation by promoting fatty acid oxidation. Keratinocytes are the primary constituents of sunlight‐exposed epidermis.
Manuel Alejandro Herrera   +4 more
wiley   +1 more source

Development of Computer Science Disciplines - A Social Network Analysis Approach

open access: yes, 2011
In contrast to many other scientific disciplines, computer science considers conference publications. Conferences have the advantage of providing fast publication of papers and of bringing researchers together to present and discuss the paper with peers.
Jarke, Matthias   +2 more
core   +1 more source

The role of fibroblast growth factors in cell and cancer metabolism

open access: yesFEBS Letters, EarlyView.
Fibroblast growth factor (FGF) signaling regulates crucial signaling cascades that promote cell proliferation, survival, and metabolism. Therefore, FGFs and their receptors are often dysregulated in human diseases, including cancer, to sustain proliferation and rewire metabolism.
Jessica Price, Chiara Francavilla
wiley   +1 more source

Analysis and Implementation of Comparison Between Podman and Docker in Container Management

open access: yesInternational Journal of Electronics and Communications System, 2023
The increasing use of the internet makes the implementation process more accessible, but the problem is that it is difficult to manage network management, with the emergence of container technologies such as Docker and Podman as efficient application ...
Husain Husain   +3 more
doaj   +1 more source

Global Modeling and Prediction of Computer Network Traffic [PDF]

open access: yes, 2009
We develop a probabilistic framework for global modeling of the traffic over a computer network. This model integrates existing single-link (-flow) traffic models with the routing over the network to capture the global traffic behavior.
Michailidis, George   +2 more
core  

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Computer Network System for Fire Flame detection from Digital Video using Fractal Geometry [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
This research aims to build a computer network system that works on detecting and locating flame by using fractal geometry in the digital video through building the network system in a server-client structure through which the characteristics of both the
Laheeb Ibrahim   +2 more
doaj   +1 more source

Network-based Computer by Using the Soundcard Packet Radio Modem [PDF]

open access: yes, 2000
Network-based computer by using the soundcard packet radio modem has many features compared to conventional networks, packet radio networks can use the soundcard as a radio modem, thus reducing costs in their manufacture, and soundcards that we use for ...
Jalinas Jalinas, SKom, MM   +1 more
core  

Detecting periodic subsequences in cyber security data

open access: yes, 2017
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy