Results 41 to 50 of about 8,951 (175)

AAKD: A standardized and comprehensive acupuncture anesthesia knowledge platform for enhanced recovery after surgery and mechanism

open access: yesVIEW, EarlyView.
Acupuncture anesthesia (AA) is an application of acupuncture innovation in surgical operations, combined with anesthetic techniques, and is a model of integrated Chinese and Western medicine. We proposed the Acupuncture Anesthesia Knowledge Database (AAKD), in which all data have been meticulously curated by field experts and assessed by a multi ...
Ying Wang   +11 more
wiley   +1 more source

Development of the security monitoring system for cluster of information systems based on the Ruby on Rails framework

open access: yesБезопасность информационных технологий, 2018
Currently, the information environment of many large organizations is  represented by a cluster of web-oriented information systems. Often these information systems are based on the Ruby on Rails framework.
David A. Khotelov   +4 more
doaj   +1 more source

Serendipity and strategy in rapid innovation

open access: yes, 2017
Innovation is to organizations what evolution is to organisms: it is how organisations adapt to changes in the environment and improve. Governments, institutions and firms that innovate are more likely to prosper and stand the test of time; those that ...
Farr, R. S.   +3 more
core   +2 more sources

AlkaPlorer: A database‐driven explorer for natural alkaloids and derivatives

open access: yesJournal of Integrative Plant Biology, EarlyView.
The alkaloid database AlkaPlorer integrates over 130,000 compounds across 12,250 species. By linking chemical structures with biological and evolutionary data, it reveals how these molecules evolve and function. This platform serves as a vital resource for AI‐driven discovery in plant metabolism and modern drug development. ABSTRACT Alkaloids, renowned
Jiahao Li   +5 more
wiley   +1 more source

Research on distributed storage of 3D stack grid model of coal mine geology based on HDF5

open access: yesGong-kuang zidonghua, 2023
The realization of multi-resolution expression and multi-parameter fusion of coal mine geological environment by using true 3D gridded geological model is one of the key contents of coal mine geological big data research.
GUO Jun
doaj   +1 more source

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

open access: yes, 2017
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor.
Baumann A.   +9 more
core   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Perancangan dan Implementasi Presensi Digital Guru dan Karyawan SMA Negeri 9 Semarang

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
Berdasarkan surat edaran dari Kepala Dinas Pendidikan Kota Semarang, terhitung mulai Januari 2015 tiap sekolah dihimbau untuk beralih dari sistem presensi manual menjadi digital.
Th. Didot Septiawan   +2 more
doaj   +1 more source

High Concurrency Iris Recognition System Based on B/S Architecture [PDF]

open access: yesJisuanji gongcheng, 2019
The scanning,processing and identification processes of existing iris login systems are under the same physical machine,which leads to the problems of high use cost and few benefited users.Therefore,an iris login system model is proposed.This model ...
XU Yuntao, XU Wujun, ZHAI Menglin
doaj   +1 more source

АНАЛІЗ І ПРОЕКТУВАННЯ РОЗПОДІЛЕНИХ СИСТЕМ НА ОСНОВІ КЛАСТЕРНИХ ТЕХНОЛОГІЙ

open access: yesКібербезпека: освіта, наука, техніка, 2022
У даній роботі виконано огляд деяких сучасних рішень, що забезпечують аналіз і проектування розподілених систем на основі кластерних технологій. Ці рішення ґрунтуються на використанні теореми CAP, яка стверджує, що для розподіленої комп'ютерної системи ...
Victor Grechaninov
doaj   +1 more source

Home - About - Disclaimer - Privacy