Results 71 to 80 of about 4,635,546 (299)

STATISTICAL PROPERTIES OF THE PSEUDORANDOM SEQUENCE GENERATION ALGORITHM

open access: yesScientific Journal of Astana IT University
One of the most important issues in the design of cryptographic algorithms is studying their cryptographic strength. Among the factors determining the reliability of cryptographic algorithms, a good pseudorandom sequence generator, which is used for key ...
Ardabek Khompysh   +4 more
doaj   +1 more source

Next‐generation proteomics improves lung cancer risk prediction

open access: yesMolecular Oncology, EarlyView.
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj   +4 more
wiley   +1 more source

First results in the development of a mobile robot with trajectory planning and object recognition capabilities

open access: yesOpen Engineering, 2016
The use of mobile robots is becoming popular in many areas of service because they ensure safety and good performance while working in dangerous or unreachable locations. Areas of application of mobile robots differ from educational research to detection
Islamgozhayev Talgat   +4 more
doaj   +1 more source

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Method for assessing the risk of user compromise based on individual security profile

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks.
Svitlana Lehominova   +4 more
doaj   +1 more source

Monitoring of circulating tumor DNA allows early detection of disease relapse in patients with operable breast cancer

open access: yesMolecular Oncology, EarlyView.
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad   +35 more
wiley   +1 more source

CONCEPT OF AUTOMATED RESPONSE TO THREATS IN CORPORATE DATABASES IN REAL-TIME MODE

open access: yesКібербезпека: освіта, наука, техніка
The article presents a concept of automated real-time threat response in corporate databases, developed with consideration of current trends in cyber threat evolution and the limitations of existing protection mechanisms. The relevance of the research is
Світлана Легомінова   +4 more
doaj   +1 more source

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

The economics of Information Technologies Standards & [PDF]

open access: yes
This research investigates the problem of Information Technologies Standards or Recommendations from an economical point of view. In our competitive economy, most enterprises adopted standardization’s processes, following recommendations of specialized ...
Eric Thivant, Laid Bouzidi
core  

Practical cryptographic strategies in the post-quantum era

open access: yes, 2018
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy