Results 41 to 50 of about 84,589 (290)

Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches

open access: yesEgyptian Informatics Journal
This comprehensive study examines cutting-edge strategies for combating Distributed Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent literature. Through a systematic review of the latest advancements, we propose
Mohamed Ouhssini   +4 more
doaj   +1 more source

Intrinsic Curvatures of Atomic Orbitals for Hydrogen-Like Atoms [PDF]

open access: yesINCAS Bulletin
Within the quantum model for the hydrogen-like atom and taking into account the concepts of differential geometry, we calculate the intrinsic curvature of several types of atomic orbitals. Based on this concept of intrinsic curvature, a classification of
Diana Rodica RADNEF-CONSTANTIN   +1 more
doaj   +1 more source

Geometrical modeling and numerical analysis of edge dislocation

open access: yesNihon Kikai Gakkai ronbunshu, 2021
In this study, we conduct modeling and numerical analysis of a straight edge dislocation in a three-dimensional geometrically nonlinear elastic medium.
Shunsuke KOBAYASHI, Ryuichi TARUMI
doaj   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Stability of an additive-quadratic functional equation in modular spaces

open access: yesOpen Mathematics
Using the direct method, we prove the Hyers-Ulam-Rassias stability of the following functional equation: ϕ(x+y,z+w)+ϕ(x−y,z−w)−2ϕ(x,z)−2ϕ(x,w)=0\phi \left(x+y,z+w)+\phi \left(x-y,z-w)-2\phi \left(x,z)-2\phi \left(x,w)=0 in ρ\rho -complete convex modular ...
Baza Abderrahman   +3 more
doaj   +1 more source

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing

open access: yesJournal of King Saud University: Computer and Information Sciences
DeepDefend is an advanced framework for real-time detection and prevention of DDoS attacks in cloud environments. It employs deep learning techniques, notably CNN-LSTM-Transformer networks, to predict network traffic entropy and detect potential attacks.
Mohamed Ouhssini   +4 more
doaj   +1 more source

Using Differential Geometry to Revisit the Paradoxes of the Instantaneous Frequency

open access: yesIEEE Open Access Journal of Power and Energy, 2022
This paper proposes a general framework to interpret the concept of Instantaneous Frequency (IF) in three-phase systems. The paper first recalls the conventional frequency-domain analysis based on the Fourier transform as well as the definition of IF ...
Federico Milano   +4 more
doaj   +1 more source

Molecular determinants of signal transduction in tropomyosin receptor kinases

open access: yesFEBS Open Bio, EarlyView.
Tropomyosin receptor kinases control critical neuronal functions, but how do the same receptors produce diverse cellular responses? This review explores the structural mechanisms behind Trk signaling diversity, focusing on allosteric modulation and ligand bias.
Giray Enkavi
wiley   +1 more source

Home - About - Disclaimer - Privacy