Results 51 to 60 of about 1,786,070 (326)
Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems [PDF]
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network.
Chen, J. +3 more
core +2 more sources
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks
The chemical terrorist attack is a type of unconventional terrorism that threatens the safety of cities. This kind of terrorist attack is highly concealed and difficult to be detected.
Rongchen Zhu +3 more
doaj +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li +4 more
doaj +1 more source
Security Trust Zone in 5G Networks
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa +4 more
core +1 more source
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang +6 more
doaj +1 more source
ECGYOLO: Mask Detection Algorithm
Of past years, wearing masks has turned into a necessity in daily life due to the rampant new coronavirus and the increasing importance people place on health and life safety.
Wenyi Hu +6 more
doaj +1 more source

