Results 91 to 100 of about 19,739 (264)

But how does it smell? An investigation of olfactory bulb size among living and fossil primates and other euarchontoglirans

open access: yesThe Anatomical Record, EarlyView.
Analysis of cranial endocast data of 181 extant and 41 fossil species from Euarchontoglires shows that there was a reduction in olfactory bulb size in Crown Primates, but that there were also subsequent reductions in various other primate clades (Anthropoidea, Catarrhini, Platyrrhini, crown Cercopithecoidea, Hominoidea).
Madlen Maryanna Lang   +6 more
wiley   +1 more source

Nasal soft‐tissue anatomy of Triceratops and other horned dinosaurs

open access: yesThe Anatomical Record, EarlyView.
Abstract Although ceratopsid dinosaurs possess a characteristically hypertrophied narial region, soft‐tissue anatomy associated with such a skeletal structure and their biological significance remain poorly understood. The present study provides the first comprehensive hypothesis on the soft‐tissue anatomy in the ceratopsid rostrum based on the Extant ...
Seishiro Tada   +5 more
wiley   +1 more source

The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

open access: yesБезопасность информационных технологий, 2012
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak   +2 more
doaj  

Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud

open access: yesIEEE Access, 2019
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang   +4 more
doaj   +1 more source

Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts

open access: yes, 2017
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan   +2 more
core  

Distinct HLA Associations for Antibody Multireactivity With Citrulline‐Containing Type II Collagen Epitopes Versus More Limited Antibody Reactivity With Citrulline‐Containing IgG Epitopes in Rheumatoid Arthritis

open access: yesArthritis &Rheumatology, EarlyView.
Objective Anticitrullinated protein antibodies (ACPAs) in rheumatoid arthritis (RA) can be promiscuous, with cross‐reactive binding to many antigens containing short motifs, or private with little cross‐reactivity. Also, ACPA reactivity patterns differ among patients with RA, including for motif‐containing epitopes in important self‐antigens like ...
S. Janna Bashar   +4 more
wiley   +1 more source

The paper puzzle as an active learning tool in the teaching of anatomy: A qualitative study of perceptions in students and near‐peer teachers

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Active learning strategies enhance medical education by fostering self‐directed learning, communication, and problem‐solving skills. The paper puzzle, a game‐based learning approach, provides an engaging way to reinforce anatomical knowledge and promote collaboration.
Ricardo Tello‐Mendoza   +6 more
wiley   +1 more source

Beyond Kahoot! Reflections and guidelines from a serial gamifying educator on when and how to effectively use games and game elements in anatomical education

open access: yesAnatomical Sciences Education, EarlyView.
Abstract According to Nietzsche, “In every real [adult], a child is hidden that wants to play.” In everyday life, playfulness and competition can make routine or dull tasks more engaging and can offer educators opportunities to engage a learner in a more entertaining or interactive manner.
Judi Laprade
wiley   +1 more source

Software deobfuscation methods: analysis and implementation

open access: yesТруды Института системного программирования РАН, 2018
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev   +5 more
doaj  

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

Home - About - Disclaimer - Privacy