Results 61 to 70 of about 28,210 (305)

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

A Construction Method of Covert Channel Based on File Storage Distribution [PDF]

open access: yesJisuanji gongcheng, 2017
A covert channel construction method based on covert information storage distribution is proposed to solve the problem that the existing reference length covert channels are different from legal channels in the channel entropy and length distribution ...
LU Siyan,LAN Shaohua
doaj   +1 more source

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

Detecting Covert Channels Through Code Augmentation

open access: yes, 2021
Modern malware increasingly exploits information hiding or steganography to elude security frameworks and remain unnoticed for long periods. To this aim, a prime technique relies upon the ability of creating covert channels to bypass the limits imposed by a sandbox or to exfiltrate data towards a remote server. Unfortunately, detecting a covert channel
M Zuppelli, L Caviglione, M Repetto
openaire   +2 more sources

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

The Technique to Prevent the Data Leakage using Covert Channels

open access: yesБезопасность информационных технологий, 2013
The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and ...
Anna Vasilievna Arkhangelskaya   +1 more
doaj  

dUTPase is essential in zebrafish development and possesses several single‐nucleotide variants with pronounced structural and functional consequences

open access: yesFEBS Open Bio, EarlyView.
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon   +6 more
wiley   +1 more source

Polarization‐resolved femtosecond Vis/IR spectroscopy tailored for resolving weak signals in biological samples using minimal sample volume

open access: yesFEBS Open Bio, EarlyView.
Unique biological samples, such as site‐specific mutant proteins, are available only in limited quantities. Here, we present a polarization‐resolved transient infrared spectroscopy setup with referencing to improve signal‐to‐noise tailored towards tracing small signals. We provide an overview of characterizing the excitation conditions for polarization‐
Clark Zahn, Karsten Heyne
wiley   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy