Results 21 to 30 of about 180,917 (343)

CTFN: Multistage CNN-Transformer Fusion Network for ECG Authentication

open access: yesIET Biometrics
In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data.
Heng Jia   +7 more
doaj   +1 more source

Cyberspace As/And Space [PDF]

open access: yes, 2007
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for ...
Cohen, Julie E.
core   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

Mapping cyberspace: visualising, analysing and exploring virtual worlds [PDF]

open access: yes, 1999
In the past years, with the development of computer networks such as the Internet and world wide web (WWW), cyberspace has been increasingly studied by researchers in various disciplines such as computer sciences, sociology, geography, and cartography
Jiang, B., Ormeling, F.
core  

Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright   +13 more
wiley   +1 more source

International Liability in Cyberspace [PDF]

open access: yes, 2001
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core   +1 more source

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics

open access: yesIET Information Security
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy