Results 71 to 80 of about 160,083 (235)

Optimized Mouse Model of Sepsis‐Associated Encephalopathy: A Rational Standard Based on Modified SHIRPA Score and Neurobehaviors in Mice

open access: yesCNS Neuroscience &Therapeutics, Volume 31, Issue 4, April 2025.
This study focuses on the standardized establishment of animal models for sepsis‐associated encephalopathy (SAE). We employed a novel scoring method to identify mice with SAE, which may provide a potential theoretical foundation and research direction for future studies on SAE.
Yuewen Xin   +8 more
wiley   +1 more source

Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2016
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a
Nithya Chidambaram   +3 more
doaj   +1 more source

Targeting depletion of myeloid-derived suppressor cells potentiates PD-L1 blockade efficacy in gastric and colon cancers

open access: yesOncoImmunology, 2022
Myeloid-derived suppressor cells (MDSCs) have been demonstrated to suppress antitumor immunity and induce resistance to PD-1/PD-L1 blockade immunotherapy in gastric and colon cancer patients.
Yao Tang   +8 more
doaj   +1 more source

Micro computed tomography based finite element models of calcium phosphate scaffolds for bone tissue engineering [PDF]

open access: yes, 2016
Bone is a living tissue that is able to regenerate by itself. However, when severe bone defects occur, the natural regeneration may be impaired. In these cases, bone graft substitutes can be used to induce the natural healing process.
Jung, Timo Karl
core  

PCOT: An open‐source toolkit for multispectral image processing

open access: yesGeoscience Data Journal, Volume 12, Issue 1, January 2025.
PCOT is a Python program and library which allows users to manipulate multispectral images and associated data, while processing uncertainty. It is in active development in support of the ExoMars mission and intended to be used on data from the Rosalind Franklinrover, but it has much greater potential for use beyond this specific context.
James Finnis   +3 more
wiley   +1 more source

SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark‐Based Grid Environment

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran   +1 more
wiley   +1 more source

Analysis of Damping Characteristics in Wind Turbine‐Energy Storage Hybrid Systems Based on Path Module

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
In this paper, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine‐storage storage integrated systems, focusing on the damping path analysis with the phase‐locked loop (PLL) as the oscillation mode.
Shanshan Cheng   +6 more
wiley   +1 more source

The Geometry of K-Orbits of a Subclass of MD5-Groups and Foliations Formed by their Generic K-Orbits [PDF]

open access: yesarXiv, 2006
The present paper is a continuation of Le Anh Vu's ones [13], [14], [15]. Specifically, the paper is concerned with the subclass of connected and simply connected MD5-groups such that their MD5-algebras $\mathcal{G}$ have the derived ideal ${\mathcal{G}}^{1} : = [ \mathcal{G},\mathcal{G} ]\equiv$ ${\bf{R}}^{3}$.
arxiv  

Protein folding and the robustness of cells

open access: yes, 2007
The intricate intracellular infrastructure of all known life forms is based on proteins. The folded shape of a protein determines both the protein’s function and the set of molecules it will bind to.
Revilla, Ferran D.   +2 more
core   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy