Results 51 to 60 of about 5,572,769 (345)

Fluctuation effects in disordered Peierls systems [PDF]

open access: yes, 2001
We review the density of states and related quantities of quasi one-dimensional disordered Peierls systems in which fluctuation effects of a backscattering potential play a crucial role.
Boguliubov   +17 more
core   +4 more sources

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation

open access: yesIEEE Access
DDoS attacks are still one of the primary sources of problems on the Internet and continue to cause significant financial losses for organizations. To mitigate their impact, detection should preferably occur close to the attack origin, e.g., at home ...
Gabriel Mendonca   +3 more
doaj   +1 more source

Correlation Attack on A5/1 [PDF]

open access: yes, 2015
Popis šifry A5/1, základních kryptografických útoků a rozbor útoku korelační metodou. Tato práce bude prospěšná každému, kdo se bude zajímat o proudové šifry, základní myšlenky kryptografických útoků a speciálně myšlenku útoku korelační metodou ...
Holec Martin
core  

Do height and weight play an important role in block and attack efficiency in high-level men's volleyball? [PDF]

open access: yes, 2017
The research objective was to study the relationships of players’ efficiency in attack and block with their anthropometric characteristics. Data on men’s weight and height and their proficiency in the game were used.
Jairus, Aleksander   +5 more
core   +2 more sources

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation

open access: yesSensors, 2019
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence.
Xiang Cheng, Jiale Zhang, Bing Chen
doaj   +1 more source

Microbial exopolysaccharide production by polyextremophiles in the adaptation to multiple extremes

open access: yesFEBS Letters, EarlyView.
Polyextremophiles are microorganisms that endure multiple extreme conditions by various adaptation strategies that also include the production of exopolysaccharides (EPSs). This review provides an integrated perspective on EPS biosynthesis, function, and regulation in these organisms, emphasizing their critical role in survival and highlighting their ...
Tracey M Gloster, Ebru Toksoy Öner
wiley   +1 more source

An exploration of hypotheses that explain herbivore and pathogen attack in restored plant communities.

open access: yesPLoS ONE, 2015
Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to ...
G Kai Blaisdell   +3 more
doaj   +1 more source

Attacking the combination generator [PDF]

open access: yes, 2009
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to
Didier, Frédéric, Laigle-Chapuy, Yann
core   +3 more sources

Home - About - Disclaimer - Privacy