Results 51 to 60 of about 3,871,840 (378)
IP Address Allocation through the Lenses of Public Goods and Scarce Resources Theories
The current Internet Protocol (IP) addressing system, Internet Protocol version 4 (IPv4), is a resource with limitations. All IPv4 address blocks have now been allocated, posing a risk that not all IP address requests will be satisfied.
Rolf H. Weber and Ulrike I. Heinrich
doaj +1 more source
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He +8 more
wiley +1 more source
Rqa based approach to detect and prevent ddos attacks in voip networks
Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets.
Jeyanthi N. +2 more
doaj +1 more source
A New Decentralized Control Strategy of Microgrids in the Internet of Energy Paradigm
The Energy Internet paradigm is the evolution of the Internet of Things concept in the power system. Microgrids (MGs), as the essential element in an Energy Internet, are expected to be controlled in a corporative and flexible manner. This paper proposes
Bilal Naji Alhasnawi +4 more
doaj +1 more source
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source
Security of internet protocol cameras - A case example [PDF]
The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of ...
Campbell, William
core +2 more sources
Facilitating the creation of IoT applications through conditional observations in CoAP [PDF]
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things.
Demeester, Piet +3 more
core +2 more sources
A Secure Authentication Protocol for Internet of Vehicles
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the ...
Chien‐Ming Chen +3 more
semanticscholar +1 more source
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source

