Results 41 to 50 of about 11,416 (262)
Fault reactivation in mining areas can cause significant hazards, including rock bursts and mining-induced seismic events. Water injection and fracturing shows a great potential for fault reactivation regulation and seismicity mitigation.
Wu CAI +5 more
doaj +1 more source
Hardware fault injection is the widely accepted approach to evaluate the behavior of a circuit in the presence of faults. Thus, it plays a key role in the design of robust circuits. This chapter presents a comprehensive review of hardware fault injection techniques, including physical and logical approaches.
Entrena, Luis +4 more
openaire +3 more sources
Software Faults Emulation by Software Fault Injection
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).The computer systems are an affected by software ...
Baiju A S, Soumya S
openaire +1 more source
Tau acetylation at K331 has limited impact on tau pathology in vivo
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto +3 more
wiley +1 more source
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel +13 more
wiley +1 more source
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
As a widely-applied public-key cryptosystem in TLS, SSL and IPSec protocols, the security of RSA cryptosystem is of great importance. At FDTC 2014, Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on ...
KONG Fanyu, LIU Xiaodong, ZHOU Dashui
doaj +3 more sources
Identify Silent Data Corruption Vulnerable Instructions Using SVM
Silent data corruption (SDC) is the most insidious and harmful result type of soft error. Identify program vulnerable instructions (PVIns) that are likely to cause SDCs is extremely significant on selective software-based protection techniques.
Na Yang, Yun Wang
doaj +1 more source
Fault injection in production [PDF]
Making the case for resilience testing.
openaire +2 more sources
Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute +17 more
wiley +1 more source
On how water injection may induce fault reactivation and slippage: A numerical method
During the water injection process in oil fields, the original stress equilibrium of faults might be disrupted by the large influx of fluids into the reservoir, resulting in movements.
Hao Yu +4 more
doaj +1 more source

