Results 81 to 90 of about 3,331,180 (402)
Impact of the Communications Decency Act of 1996 on Federal Prosecutions of Computer Dissemination of Obscenity, Indecency, and Child Pornography [PDF]
With the passage of the Communications Decency Act of 1996, Congress provided federal prosecutors with a potentially powerful new tool for combating indecent communications sent or made available to minors through computer networks.
Keane, William P.
core +1 more source
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad+13 more
wiley +1 more source
Smart cities have witnessed a transformation in urban living through the Internet of Things (IoT), which has improved connectedness, efficiency, and sustainability.
Ashwag Alotaibi+2 more
doaj +1 more source
In this paper, we discuss some challenges regarding the Hadoop framework. One of the main ones is the computing performance of Hadoop MapReduce jobs in terms of CPU, memory, and hard disk I/O. The networking side of a Hadoop cluster is another challenge,
Ali Khaleel, Hamed Al-Raweshidy
doaj +1 more source
Detection of Complex Networks Modularity by Dynamical Clustering
Based on cluster de-synchronization properties of phase oscillators, we introduce an efficient method for the detection and identification of modules in complex networks.
A. Pluchino+10 more
core +1 more source
Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core +4 more sources
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran+16 more
wiley +1 more source
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani+1 more
doaj +1 more source
Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song+13 more
wiley +1 more source
Virtual Power Plants (VPPs) have emerged as dynamic solutions, harnessing the distributed resources such as solar panel and batteries. However, the complicated interconnectedness of VPPs exposes them to unique cybersecurity vulnerabilities ...
Razan Alajlan+3 more
doaj +1 more source