Results 61 to 70 of about 308,277 (215)

Modeling drug mechanism of action with large scale gene-expression profiles using GPAR, an artificial intelligence platform

open access: yesBMC Bioinformatics, 2021
Background Querying drug-induced gene expression profiles with machine learning method is an effective way for revealing drug mechanism of actions (MOAs), which is strongly supported by the growth of large scale and high-throughput gene expression ...
Shengqiao Gao   +7 more
doaj   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Novel energy optimizer, meldonium, rapidly restores acute hypobaric hypoxia-induced brain injury by targeting phosphoglycerate kinase 1

open access: yesCell Communication and Signaling
Background Acute hypobaric hypoxia-induced brain injury has been a challenge in the health management of mountaineers; therefore, new neuroprotective agents are urgently required.
Fengying Liu   +11 more
doaj   +1 more source

Polymer Distribution and Mechanism Conversion in Multiple Media of Phase-Separated Controlled-Release Film-Coating

open access: yesPharmaceutics, 2019
Phase-separated films of water-insoluble ethyl cellulose (EC) and water-soluble hydroxypropyl cellulose (HPC) can be utilized to tailor drug release from coated pellets. In the present study, the effects of HPC levels and the pH, type, ionic strength and
Lu Chen   +9 more
doaj   +1 more source

On Ladder Logic Bombs in Industrial Control Systems

open access: yes, 2017
In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e.
D-Y Kim   +5 more
core   +1 more source

CIDPro: Custom Instructions for Dynamic Program Diversification

open access: yes, 2018
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar   +4 more
core   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

PPARγ-responsive luciferase reporter system for high-throughput screening of chemical toxins with potential pulmonary fibrosis effects

open access: yesEcotoxicology and Environmental Safety
Background: Pulmonary fibrosis (PF) is a progressive and fatal lung disorder, and emerging evidence suggests that dysregulation of peroxisome proliferator-activated receptor gamma (PPARγ) plays a critical role in its pathogenesis.
Xueyang Lin   +17 more
doaj   +1 more source

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy