Results 31 to 40 of about 567,688 (336)
Resource-constrained classification using a cascade of neural network layers [PDF]
Deep neural networks are the state of the art technique for a wide variety of classification problems. Although deeper networks are able to make more accurate classifications, the value brought by an additional hidden layer diminishes rapidly.
Bohez, Steven +5 more
core +1 more source
Decentralized internet infrastructure
Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between ...
Bingyang LIU +6 more
doaj +2 more sources
A Survey on Handover Management in Mobility Architectures
This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on ...
Ferretti, Stefano +2 more
core +1 more source
Peptide‐based ligand antagonists block a Vibrio cholerae adhesin
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang +9 more
wiley +1 more source
Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network
The Internet of Things enabled Wireless Sensor Networks (IoT-enabled WSNs) are highly susceptible to a wide range of Distributed Denial of Service (DDoS) attacks.
Kavita S. Kumavat, Joanne Gomes
doaj +1 more source
The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security ...
Hanshu Hong, Bing Hu, Zhixin Sun
doaj +1 more source
Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva +10 more
wiley +1 more source
Effective video multicast over wireless internet [PDF]
With the rapid growth of wireless networks and great success of Internet video, wireless video services are expected to be widely deployed in the near future. As different types of wireless networks are converging into all IP networks, i.e., the Internet,
Li, B, Lin, C, Ni, Q, Yin, H
core
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Network-Layer Accountability Protocols: A Survey
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj +1 more source

