Results 21 to 30 of about 56,667 (320)

Model and application of cyberspace information system

open access: yesTongxin xuebao, 2020
For the visualization of cyberspace is still using the traditional geographic information system,which makes it difficult to truly express the characteristics and laws of cyberspace,a multi-scale,multi-dimensional and multi-view cyberspace information ...
Jilong WANG   +3 more
doaj   +2 more sources

Digital Twins: Bridging Physical Space and Cyberspace

open access: yesComputer, 2019
A digital twin is a digital model of a real entity, the physical twin (such as an object, a process, or a complex aggregation). It is both a digital shadow reflecting the status/operation of its physical twin and a digital thread recording the evolution ...
R. Saracco
semanticscholar   +1 more source

Identifying the Challenges of Users in Using the Services of Electronic Health Platforms [PDF]

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2023
Introduction: In recent years, especially with the spread of the COVID-19 disease, the use of electronic health services has increased greatly. Along with the growth and development of the use of electronic services among users, the concern about ethical
Nafiseh Salehnia, Fatemeh Salehnia
doaj  

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

open access: yesApplied Sciences, 2023
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao   +5 more
doaj   +1 more source

CTFN: Multistage CNN-Transformer Fusion Network for ECG Authentication

open access: yesIET Biometrics
In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data.
Heng Jia   +7 more
doaj   +1 more source

Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack   +12 more
wiley   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

The end of the road for the UN GGE process: The future regulation of cyberspace

open access: yesJournal of Cybersecurity, 2019
In June 2017, the fifth and so far last of the UN Group of Governmental Experts (UN GGE) were un-able to agree on a consensus report that would have brought additional clarity to how international law regulates cyberspace. The article discusses why the UN
A. Henriksen
semanticscholar   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy