Results 71 to 80 of about 4,635,546 (299)
STATISTICAL PROPERTIES OF THE PSEUDORANDOM SEQUENCE GENERATION ALGORITHM
One of the most important issues in the design of cryptographic algorithms is studying their cryptographic strength. Among the factors determining the reliability of cryptographic algorithms, a good pseudorandom sequence generator, which is used for key ...
Ardabek Khompysh +4 more
doaj +1 more source
Next‐generation proteomics improves lung cancer risk prediction
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj +4 more
wiley +1 more source
The use of mobile robots is becoming popular in many areas of service because they ensure safety and good performance while working in dangerous or unreachable locations. Areas of application of mobile robots differ from educational research to detection
Islamgozhayev Talgat +4 more
doaj +1 more source
Potential therapeutic targeting of BKCa channels in glioblastoma treatment
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak +4 more
wiley +1 more source
Method for assessing the risk of user compromise based on individual security profile
This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks.
Svitlana Lehominova +4 more
doaj +1 more source
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
CONCEPT OF AUTOMATED RESPONSE TO THREATS IN CORPORATE DATABASES IN REAL-TIME MODE
The article presents a concept of automated real-time threat response in corporate databases, developed with consideration of current trends in cyber threat evolution and the limitations of existing protection mechanisms. The relevance of the research is
Світлана Легомінова +4 more
doaj +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
The economics of Information Technologies Standards & [PDF]
This research investigates the problem of Information Technologies Standards or Recommendations from an economical point of view. In our competitive economy, most enterprises adopted standardization’s processes, following recommendations of specialized ...
Eric Thivant, Laid Bouzidi
core
Practical cryptographic strategies in the post-quantum era
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K. +3 more
core +1 more source

