Results 21 to 30 of about 308,277 (215)

Countermeasures [PDF]

open access: yesExtended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Ubiquitous computing is leading to ubiquitous sensing. Sensor components such as motion, proximity, and biometric sensors are increasingly common features in everyday objects. However, the presence and full capabilities of these components are often not clear to users. Sensor-enhanced objects have the ability to perceive without being perceived.
openaire   +2 more sources

Remote Sensing Image Dataset Expansion Based on Generative Adversarial Networks with Modified Shuffle Attention

open access: yesSensors, 2021
With the development of science and technology, neural networks, as an effective tool in image processing, play an important role in gradual remote-sensing image-processing.
Lu Chen, Hongjun Wang, Xianghao Meng
doaj   +1 more source

Lung-Targeted Delivery of Cepharanthine by an Erythrocyte-Anchoring Strategy for the Treatment of Acute Lung Injury

open access: yesPharmaceutics, 2022
As one of the most frequent complications of critical illness, acute lung injury (ALI) carries a high risk of clinical morbidity and mortality. Cepharanthine (CPA) has significant anti-inflammatory activity, however, due to poor water solubility, low ...
Jinpeng Zheng   +10 more
doaj   +1 more source

Recovery efficiencies for Burkholderia thailandensis from various aerosol sampling media

open access: yesFrontiers in Cellular and Infection Microbiology, 2012
Burkholderia thailandensis is used in the laboratory as a surrogate of the more virulent B. pseudomallei. Since inhalation is believed to be a natural route of infection for B. pseudomallei, many animal studies with B. pseudomallei and B. thailandensis
Paul eDabisch   +3 more
doaj   +1 more source

Functional epitopes and neutralizing antibodies of vaccinia virus

open access: yesFrontiers in Microbiology, 2023
Smallpox is an infectious disease caused by the variola virus, and it has a high mortality rate. Historically it has broken out in many countries and it was a great threat to human health.
Fenghao Peng   +12 more
doaj   +1 more source

Psoralen Inactivation of Viruses: A Process for the Safe Manipulation of Viral Antigen and Nucleic Acid

open access: yesViruses, 2015
High consequence human pathogenic viruses must be handled at biosafety level 2, 3 or 4 and must be rendered non-infectious before they can be utilized for molecular or immunological applications at lower biosafety levels.
Katherine Schneider   +10 more
doaj   +1 more source

Emitter Identification of Digital Modulation Transmitter Based on Nonlinearity and Modulation Distortion of Power Amplifier

open access: yesSensors, 2021
Specific transmitter identification (SEI) is a technology that uses a received signal to identify to which individual radiation source the transmitted signal belongs.
Yue Chen, Xiang Chen, Yingke Lei
doaj   +1 more source

High-Intensity Synchrotron Radiation Effects [PDF]

open access: yes, 2016
Various effects of intense synchrotron radiation on the performance of particle accelerators, especially for storage rings, are discussed. Following a brief introduction to synchrotron radiation, the basic concepts of heat load, gas load, electron ...
Suetsugu, Y.
core   +3 more sources

Insights into the pharmacodynamics and pharmacokinetics of meldonium after exposure to acute high altitude

open access: yesFrontiers in Pharmacology, 2023
Objective: Meldonium, a well-known cardioprotective drug, has been reported to be protective against pulmonary injury at high altitudes; however, the pharmacodynamics of meldonium in other vital organs under acute high-altitude injury are less ...
Fengying Liu   +13 more
doaj   +1 more source

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]

open access: yes, 2013
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy