Results 261 to 270 of about 31,005 (332)
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
CISO: Species distribution modelling Conditioned on Incomplete Species Observations
Abstract Species distribution models (SDMs) are widely used to predict species' geographic distributions, serving as critical tools for ecological research and conservation planning. Typically, SDMs relate species occurrences to environmental variables representing abiotic factors, such as temperature, precipitation, and soil properties.
Hager Radi Abdelwahed +6 more
wiley +1 more source
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR. [PDF]
Chinnaperumal S +7 more
europepmc +1 more source
This study reports the three‐dimensional structure of an important cat allergen, Fel d 4, that shares high homology with Equ c 1 (i.e., major horse allergen) and Can f 6 (i.e., dog allergen). The C‐terminal region of the Fel d 4 contains a major IgE‐reactive epitope.
Nikolina Todorović +14 more
wiley +1 more source
Integrating skin barrier measurements with omics and machine learning, we found that postbiotics and NAM regulate skin homeostasis through distinct, strain‐ and dose‐dependent mechanisms. Postbiotics primarily modulate skin barrier function by promoting keratinocyte differentiation and suppressing inflammation.
Yagiz Pat +21 more
wiley +1 more source
Blockchain-enabled data governance for privacy-preserved sharing of confidential data. [PDF]
Zhang J, Datta A.
europepmc +1 more source
EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores. [PDF]
Li Y, Chen J, Zhou F, Ji D.
europepmc +1 more source
Identity-Based Matchmaking Encryption with Equality Test. [PDF]
Yan Z, Lin X, Zhang X, Xu J, Qu H.
europepmc +1 more source
Secure and efficient substring searchable symmetric encryption using advanced data structure
博章 山本
openalex +1 more source

