Results 21 to 30 of about 1,899,220 (174)

Short Tandem Repeats in plants: Genomic distribution and function prediction

open access: yesElectronic Journal of Biotechnology, 2021
Background: Short Tandem repeats (STRs) existed as popular elements in both eukaryotic and prokaryotic genomes. Results: In this study, we analyzed the characteristics, distributions, and motif features of STRs within whole-genomes of 140 plant species ...
Lin Zhu   +8 more
doaj  

NRD: Nicotiana Resistance Database, a Comprehensive Platform of Stress Tolerance in Nicotiana

open access: yesAgronomy, 2022
Nicotiana is one of the most important economic crops and model plants; however, its growth is affected by various biotic and abiotic stresses. In this study, 27,142 potential resistance genes were identified in six Nicotiana species, belonging to ...
Yudong Chen   +4 more
doaj   +1 more source

How Could Equality and Data Protection Law Shape AI Fairness for People with Disabilities? [PDF]

open access: yesarXiv, 2021
This article examines the concept of 'AI fairness' for people with disabilities from the perspective of data protection and equality law. This examination demonstrates that there is a need for a distinctive approach to AI fairness that is fundamentally different to that used for other protected characteristics, due to the different ways in which ...
arxiv  

Genome-wide identification and expression analysis of NF-Y gene family in tobacco (Nicotiana tabacum L.)

open access: yesScientific Reports
Nuclear factor Y (NF-Y) gene family is an important transcription factor composed of three subfamilies of NF-YA, NF-YB and NF-YC, which is involved in plant growth, development and stress response.
Yue Tian   +6 more
doaj   +1 more source

Protecting Time Series Data with Minimal Forecast Loss [PDF]

open access: yesarXiv, 2021
Forecasting could be negatively impacted due to anonymization requirements in data protection legislation. To measure the potential severity of this problem, we derive theoretical bounds for the loss to forecasts from additive exponential smoothing models using protected data.
arxiv  

Data Protection for Data Privacy-A South African Problem? [PDF]

open access: yesarXiv, 2023
This study proposes a comprehensive framework for enhancing data security and privacy within organizations through data protection awareness. It employs a quantitative method and survey research strategy to assess the level of data protection awareness among employees of a public organization.
arxiv  

African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions [PDF]

open access: yesarXiv, 2023
This paper investigates the challenges and opportunities of implementing the African Union Convention on Cyber Security and Personal Data Protection (AUDPC) across Africa. Focusing on legal, regulatory, technical, infrastructural, capacity building, awareness, Harmonization, and cross-border cooperation challenges, the paper identifies key findings ...
arxiv  

Comprehensive Building Fire Risk Prediction Using Machine Learning and Stacking Ensemble Methods

open access: yesFire
Building fires pose a critical threat to life and property. Therefore, accurate fire risk prediction is essential for effective building fire prevention and mitigation strategies.
Seungil Ahn   +3 more
doaj   +1 more source

Air Quality Improvement in Urban Street Canyons: An Assessment of the Effects of Selected Traffic Management Strategies Using OSPM Model

open access: yesApplied Sciences, 2023
Constantly changing vehicle stock, modification of road infrastructure, and other conditions result in a need to update the knowledge on the effectiveness of individual traffic management strategies, which could form the basis for actions taken by local ...
Robert Oleniacz   +3 more
doaj   +1 more source

A Personal data Value at Risk Approach [PDF]

open access: yesEnr\'iquez, L. (2024). A personal data value at risk (Pd-VaR) approach. Journal of Research, Innovation and Technologies, Volume III, 2(6), 141-158
What if the main data protection vulnerability is risk management? Data Protection merges three disciplines: data protection law, information security, and risk management. Nonetheless, very little research has been made on the field of data protection risk management, where subjectivity and superficiality are the dominant state of the art.
arxiv   +1 more source

Home - About - Disclaimer - Privacy