Results 61 to 70 of about 1,916,317 (370)
Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu+3 more
doaj +1 more source
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang+3 more
wiley +1 more source
HRCTNet: a hybrid network with high-resolution representation for object detection in UAV image
Object detection in unmanned aerial vehicle (UAV) images has attracted the increasing attention of researchers in recent years. However, it is challenging for small object detection using conventional detection methods because less location and semantic ...
Wenjie Xing, Zhenchao Cui, Jing Qi
doaj +1 more source
Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields
Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin.
Mar Gimenez-Aguilar+3 more
doaj +1 more source
An examination into the role of knowledge management and computer security in organizations [PDF]
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar+4 more
wiley +1 more source
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li+4 more
doaj +1 more source
Chinese Character Components Segmentation Method Based on Faster RCNN
To solve the component segmentation problem caused by the sticking and overlapping of parts in incoherent handwritten calligraphy characters, we propose a Chinese character part segmentation method based on Faster RCNN. The method utilizes the advantages
Xiang Gao+3 more
doaj +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source