Results 71 to 80 of about 30,382 (272)
Uniform monolayer Cr2Ge2Te6 films are achieved on Si substrates by molecular beam epitaxy. Intrinsic ferromagnetism with perpendicular magnetic anisotropy is established in the films by anomalous Hall effect and superconducting quantum interference device measurements, albeit with strong magnetic fluctuations characteristic of its 2D nature.
Pengfei Ji +15 more
wiley +1 more source
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia +3 more
core +1 more source
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe +4 more
wiley +1 more source
Evaluation of Local Security Event Management System vs. Standard Antivirus Software
The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems.
Antonio Pérez-Sánchez, Rafael Palacios
doaj +1 more source
This study reveals that metformin promotes glucuronic acid metabolism in lung adenocarcinoma by activating UGDH S476 phosphorylation and enhancing the conversion of UDPG to UDPGA based on metabolomics analysis. Through compound virtual screening, it is found that plantainoside targeting UGDH downstream UXS1 leads to UDPGA toxicity accumulation ...
Qihai Sui +14 more
wiley +1 more source
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis +2 more
core +2 more sources
Lightweight obfuscation techniques for modeling attacks resistant PUFs [PDF]
Building lightweight security for low-cost pervasive devices is a major challenge considering the design requirements of a small footprint and low power consumption. Physical Unclonable Functions (PUFs) have emerged as a promising technology to provide a low-cost authentication for such devices. By exploiting intrinsic manufacturing process variations,
Mispan, Mohd Syafiq +2 more
openaire +2 more sources
By integrating data from in vitro, ex vivo, and in vivo models, our research identifies the MARV glycoprotein as a remarkable hemorrhagic factor, filling a major gap in this important field. It also provides practical experimental tools for the basic research on viral pathogenesis and applied research aimed at antiviral intervention for hemorrhagic ...
Ting Yao +11 more
wiley +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
Tis-Bad: A Time Series-Based Deobfuscation Algorithm
Location-Based Services (LBSs) have brought along many benefitsto users and service providers in terms of improved quality of existing services and a better user experience.
A Labrador +4 more
doaj +1 more source

