Results 91 to 100 of about 967,964 (329)
Database Optimizing Services [PDF]
Almost every organization has at its centre a database. The database provides support for conducting different activities, whether it is production, sales and marketing or internal operations.
Ghencea, Adrian, Gieger, Immo
core +1 more source
Genetic and pharmacological inhibition of SLC11A1 functioning as an H+/Fe2+ antiporter–mediated lysosomal iron accumulation in microglia promotes lysosomal lumen acidification, increases CTSD expression, enhances lysosomal myelin debris uptake and degradation, and promotes repair following white matter stroke. ABSTRACT White matter stroke (WMS) results
Lingling Qiu +11 more
wiley +1 more source
Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks.
Ade Dotun Ajasa +2 more
doaj +1 more source
Lipid overload suppresses SREBF2‐mediated FNTB expression, leading to defective Lamin A maturation and nuclear envelope instability. This nuclear catastrophe triggers a pro‐fibrotic senescence program in cardiomyocytes. Notably, restoring nuclear integrity via AAV9‐based gene therapy effectively attenuates cardiac remodeling, identifying the ...
Yuxiao Chen +16 more
wiley +1 more source
Big data security analysis method based on self-update threat intelligence database
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.
Yanfang HOU, Jinhua WANG
doaj +2 more sources
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang +16 more
wiley +1 more source
SELECTED PROBLEMS OF INDUSTRY DATABASES AND INFORMATION INFRASTRUCTURE SECURITY [PDF]
Dariusz Karpisz +2 more
openalex +1 more source
This study presents the first telomere‐to‐telomere genomes and population resources for Diaporthe pathogens, uncovering the largest known fungal repertoire of secondary metabolite gene clusters. Structural variations and horizontal gene transfer drive cluster diversification, while specific rapidly evolving clusters control virulence, offering novel ...
Kainan Li +9 more
wiley +1 more source
Analysis of Security Function of Coal Mine Accident Cases and Design of Its Database System
The paper indicated security functions of coal mine accident cases were strengthening security consciousness of miners, promoting implementation of security policy, providing reference for urgent processing of accidents, predicting danger of mines ...
LIU Yang +3 more
doaj

