Results 51 to 60 of about 6,929,434 (416)

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

5th Annual Progress Reporting and Coordination Meeting on CCAFS Projects and Regional Activities in Southeast Asia [PDF]

open access: yes, 2020
The proceedings document the results of the 5th Annual Progress Reporting and Coordination Meeting on CCAFS Projects and Regional Activities in Southeast Asia.
CGIAR Research Program on Climate Change, Agriculture and Food Security
core  

Autophagy in cancer and protein conformational disorders

open access: yesFEBS Letters, EarlyView.
Autophagy plays a crucial role in numerous biological processes, including protein and organelle quality control, development, immunity, and metabolism. Hence, dysregulation or mutations in autophagy‐related genes have been implicated in a wide range of human diseases.
Sergio Attanasio
wiley   +1 more source

A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network

open access: yesEntropy, 2023
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu   +4 more
doaj   +1 more source

Secure Composition of Robust and Optimising Compilers [PDF]

open access: yesarXiv, 2023
To ensure that secure applications do not leak their secrets, they are required to uphold several security properties such as spatial and temporal memory safety as well as cryptographic constant time. Existing work shows how to enforce these properties individually, in an architecture-independent way, by using secure compiler passes that each focus on ...
arxiv  

Secure physical layer network coding versus secure network coding [PDF]

open access: yesEntropy, 24(1), 47 (2022), 2018
Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped. In this framework, if the channels of the network has noise, we apply the error correction to noisy channel before applying the secure network coding.
arxiv   +1 more source

Securing By Design [PDF]

open access: yes, 2011
This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection.
Adorno   +60 more
core   +1 more source

In vivo evidence for glycyl radical insertion into a catalytically inactive variant of pyruvate formate‐lyase

open access: yesFEBS Letters, EarlyView.
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel   +2 more
wiley   +1 more source

Validation of a multiplex amplification system of 19 autosomal STRs and 27 Y-STRs

open access: yesForensic Sciences Research, 2020
This article describes a newly devised autosomal short tandem repeat (STR) multiplex polymerase chain reaction (PCR) system for 19 autosomal loci (D12S391, D13S317, D16S539, D18S51, D19S433, D2S1338, D21S11, D3S1358, D5S818, D6S1043, D7S820, D8S1179 ...
Feng Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy