Results 51 to 60 of about 1,364,067 (299)

An optimized protocol to detect high‐throughput DNA methylation from custom targeted sequences on 96 samples simultaneously

open access: yesFEBS Open Bio, EarlyView.
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli   +4 more
wiley   +1 more source

Nice to know [PDF]

open access: yes, 2008
The byproduct of today’s massive interconnectivity is that basically nothing and no-one is immune to cyber attacks any longer. Sadly, this can be demonstrated rather trivially.
Etalle, Sandro
core   +2 more sources

Thrombolytic proteins profiling: High‐throughput activity, selectivity, and resistance assays

open access: yesFEBS Open Bio, EarlyView.
We present optimized biochemical protocols for evaluating thrombolytic proteins, enabling rapid and robust screening of enzymatic activity, inhibition resistance, and fibrin affinity, stimulation, and selectivity. The outcome translates to key clinical indicators such as biological half‐life and bleeding risk. These assays streamline the development of
Martin Toul   +3 more
wiley   +1 more source

Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks

open access: yesEURASIP Journal on Information Security, 2020
Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup (P&XE) scheme is proposed.
Junfeng Tian, Zilong Wang, Zhen Li
doaj   +1 more source

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

An examination into the role of knowledge management and computer security in organizations [PDF]

open access: yes, 2005
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core  

Overcoming the insider: reducing employee crime through Situational Crime Prevention [PDF]

open access: yes, 2009
Information security has become increasingly important for organizations, given their dependence on ICT. Not surprisingly, therefore, the external threats posed by hackers and viruses have received extensive coverage in the mass media.
Cornish D.   +4 more
core   +1 more source

Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay   +12 more
wiley   +1 more source

Keamanan pada Grid Computing~Survey Paper

open access: yesElkawnie: Journal of Islamic Science and Technology, 2015
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj   +1 more source

Software for Wearable Devices: Challenges and Opportunities

open access: yes, 2015
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy