Results 81 to 90 of about 3,331,180 (402)

Impact of the Communications Decency Act of 1996 on Federal Prosecutions of Computer Dissemination of Obscenity, Indecency, and Child Pornography [PDF]

open access: yes, 1996
With the passage of the Communications Decency Act of 1996, Congress provided federal prosecutors with a potentially powerful new tool for combating indecent communications sent or made available to minors through computer networks.
Keane, William P.
core   +1 more source

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions

open access: yesSensors
Smart cities have witnessed a transformation in urban living through the Internet of Things (IoT), which has improved connectedness, efficiency, and sustainability.
Ashwag Alotaibi   +2 more
doaj   +1 more source

Optimization of Computing and Networking Resources of a Hadoop Cluster Based on Software Defined Network

open access: yesIEEE Access, 2018
In this paper, we discuss some challenges regarding the Hadoop framework. One of the main ones is the computing performance of Hadoop MapReduce jobs in terms of CPU, memory, and hard disk I/O. The networking side of a Hadoop cluster is another challenge,
Ali Khaleel, Hamed Al-Raweshidy
doaj   +1 more source

Detection of Complex Networks Modularity by Dynamical Clustering

open access: yes, 2006
Based on cluster de-synchronization properties of phase oscillators, we introduce an efficient method for the detection and identification of modules in complex networks.
A. Pluchino   +10 more
core   +1 more source

Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]

open access: yes, 2017
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core   +4 more sources

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems

open access: yesIEEE Access
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani   +1 more
doaj   +1 more source

Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value

open access: yesMolecular Oncology, EarlyView.
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song   +13 more
wiley   +1 more source

A Literature Review on Cybersecurity Risks and Challenges Assessments in Virtual Power Plants: Current Landscape and Future Research Directions

open access: yesIEEE Access
Virtual Power Plants (VPPs) have emerged as dynamic solutions, harnessing the distributed resources such as solar panel and batteries. However, the complicated interconnectedness of VPPs exposes them to unique cybersecurity vulnerabilities ...
Razan Alajlan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy