Results 21 to 30 of about 180,917 (343)
CTFN: Multistage CNN-Transformer Fusion Network for ECG Authentication
In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data.
Heng Jia +7 more
doaj +1 more source
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for ...
Cohen, Julie E.
core +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
Mapping cyberspace: visualising, analysing and exploring virtual worlds [PDF]
In the past years, with the development of computer networks such as the Internet and world wide web (WWW), cyberspace has been increasingly studied by researchers in various disciplines such as computer sciences, sociology, geography, and cartography
Jiang, B., Ormeling, F.
core
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
International Liability in Cyberspace [PDF]
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core +1 more source
Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva +10 more
wiley +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu +3 more
doaj +1 more source

