Results 41 to 50 of about 364,629 (281)
This study introduces an affordable machine learning platform for simultaneous dengue and zika detection using fluorine‐doped tin oxide thin films modified with gold nanoparticles and DNA aptamers. Designed for low‐cost, hardware‐limited devices (< $25), the model achieves 95.3% accuracy and uses only 9.4 kB of RAM, demonstrating viability for resource‐
Marina Ribeiro Batistuti Sawazaki +3 more
wiley +1 more source
A Survey on Cross-Architectural IoT Malware Threat Hunting
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively ...
Anandharaju Durai Raju +4 more
doaj +1 more source
Security Implications of Running Windows Software on a Linux System Using Wine [PDF]
Linux is considered to be less prone to malware compared to other operating systems, and as a result Linux users rarely run anti-malware. However, many popular software applications released on other platforms cannot run natively on Linux.
A Provataki +11 more
core +1 more source
ControlIt: A Universal Framework for Translational, Adaptive, and Online Brain–Computer Interfaces
Brain–computer interfaces (BCIs) lack a unified platform that works across signals and algorithms. ControlIt, an open‐source, modular ROS2‐based BCI framework supporting electroencephalography (EEG), electrocorticography (ECoG), and spike‐based decoding across both classification and regression tasks is presented.
Wanlin Yang +12 more
wiley +1 more source
Comparativo de performance entre arquiteturas ibm z e ibm power system
Neste artigo comparativo técnico são utilizados os recursos de duas importantes ferramentas da história da IBM, sendo eles: IBM Z e IBM Power System. Ambos os sistemas são dotados de tecnologia atual e utilizam como base de sistema operacional o Linux ...
Cássio Félix Moura +3 more
doaj
Optimization Algorithm for Selecting Compressible Data
The article deals with the problem of the efficiency of data compression algorithms. The analysis of the effectiveness of the speed characteristics of data compression of the Btrfs file system of the Linux kernel has been performed.
E. V. Mozhenkova +2 more
doaj +1 more source
Detecting cryptic ghost lineage introgression in four‐taxon genomic datasets
Abstract Premise Hybridization and introgression are pervasive evolutionary forces that have played fundamental roles in shaping the diversity of wild and domesticated plants. Four‐taxon tests for introgression provide a reliable framework for detecting signatures of ancient introgression from genomic data, which have played an important role in ...
Evan S. Forsythe +3 more
wiley +1 more source
Automated system for deploying operating systems using LAN (PXE SERVER)
PXE is an environment for booting computers using a network card without using hard drives, CDs and other devices used while booting operating systems.
I. V. Kendysh
doaj +1 more source
Objective Rheumatoid arthritis (RA) is a heterogeneous autoimmune disease characterized by clinical and molecular heterogeneity, notably in the presence of anti–cyclic citrullinated peptide (CCP) antibodies. Patients with CCP+ RA exhibit more severe disease progression and distinct treatment responses compared to patients with CCP− RA.
Javad Rahimikollu +10 more
wiley +1 more source
Production of 3D printed biomodels of the canine brain for veterinary neuroanatomy teaching
Abstract Teaching neuroanatomy presents multiple challenges to both students and teachers, as it is a subject with highly dense content that commonly causes the development of aversion by students, a phenomenon referred to as “neurophobia,” which has been documented in human and veterinary medicine students.
João Victor Barbosa Tenório Fireman +1 more
wiley +1 more source

