Results 91 to 100 of about 967,964 (329)

Database Optimizing Services [PDF]

open access: yes
Almost every organization has at its centre a database. The database provides support for conducting different activities, whether it is production, sales and marketing or internal operations.
Ghencea, Adrian, Gieger, Immo
core   +1 more source

Inhibition of SLC11A1‐Mediated Lysosomal Iron Accumulation in Microglia Promotes Repair Following White Matter Stroke

open access: yesAdvanced Science, EarlyView.
Genetic and pharmacological inhibition of SLC11A1 functioning as an H+/Fe2+ antiporter–mediated lysosomal iron accumulation in microglia promotes lysosomal lumen acidification, increases CTSD expression, enhances lysosomal myelin debris uptake and degradation, and promotes repair following white matter stroke. ABSTRACT White matter stroke (WMS) results
Lingling Qiu   +11 more
wiley   +1 more source

Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance

open access: yesFuture Internet
Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks.
Ade Dotun Ajasa   +2 more
doaj   +1 more source

Farnesyltransferase Deficiency in Cardiomyocytes Initiates Senescence and Contributes to Cardiac Fibrosis

open access: yesAdvanced Science, EarlyView.
Lipid overload suppresses SREBF2‐mediated FNTB expression, leading to defective Lamin A maturation and nuclear envelope instability. This nuclear catastrophe triggers a pro‐fibrotic senescence program in cardiomyocytes. Notably, restoring nuclear integrity via AAV9‐based gene therapy effectively attenuates cardiac remodeling, identifying the ...
Yuxiao Chen   +16 more
wiley   +1 more source

Big data security analysis method based on self-update threat intelligence database

open access: yesDianxin kexue, 2018
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.
Yanfang HOU, Jinhua WANG
doaj   +2 more sources

Integrated Single‐Cell and Spatial Transcriptomics Reveal Cell‐Type‐Specific Immune Regulatory Networks in Maize Responding to Southern Corn Rust

open access: yesAdvanced Science, EarlyView.
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang   +16 more
wiley   +1 more source

Telomere‐to‐Telomere Genomes Reveal that Multiscale Evolution Shapes the Largest Metabolic Arsenal of Diaporthe Fungi

open access: yesAdvanced Science, EarlyView.
This study presents the first telomere‐to‐telomere genomes and population resources for Diaporthe pathogens, uncovering the largest known fungal repertoire of secondary metabolite gene clusters. Structural variations and horizontal gene transfer drive cluster diversification, while specific rapidly evolving clusters control virulence, offering novel ...
Kainan Li   +9 more
wiley   +1 more source

Analysis of Security Function of Coal Mine Accident Cases and Design of Its Database System

open access: yesGong-kuang zidonghua, 2012
The paper indicated security functions of coal mine accident cases were strengthening security consciousness of miners, promoting implementation of security policy, providing reference for urgent processing of accidents, predicting danger of mines ...
LIU Yang   +3 more
doaj  

Home - About - Disclaimer - Privacy