Results 161 to 170 of about 19,739 (264)
Biomolecular Interaction Prediction in the Pre‐ and Post‐AlphaFold Era: The 8th CAPRI Evaluation
ABSTRACT We report on the 8th CAPRI Evaluation period, capturing the assessment of CAPRI Rounds 47 to 55 (excluding the CASP and COVID‐related Rounds), which have witnessed the transition to AI‐driven prediction tools such as AlphaFold and related alternatives. The prediction Rounds in this evaluation are characterized by a high level of difficulty due
Marc F. Lensink +5 more
wiley +1 more source
JDroid: Android malware detection using hybrid opcode feature vector. [PDF]
Arslan RS.
europepmc +1 more source
ABSTRACT Anaerobic ammonium‐oxidizing (anammox) bacteria employ a unique, hydrazine‐based pathway to obtain energy from nitrite and ammonium. These organisms possess distinct Rieske/cytochrome b complexes whose precise role in anammox metabolism remains unclear, but which have been proposed to include the generation of NAD(P)H.
David Hauser +4 more
wiley +1 more source
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
SOFTWARE MODULE PROTECTION METHOD BASED ON OBFUSCATION PROCEDURE
S.G. Semenov +3 more
openaire +1 more source
ABSTRACT As a promising alternative to sluggish Li2CO3‐based Li‐CO2 electrochemistry, Li2C2O4 offers a favorable 2e− discharge pathway, yet its selective formation and reversible decomposition remain debated. Herein, we propose a nonmetal‐metal synergistic catalyst—B‐Ti coregulated layered transition metal boride Ti18B18O9/graphene (B‐Ti/TiBOG)—to ...
Qiong Peng +8 more
wiley +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
Rationale Mass spectrometry (MS) is introduced to high school students in the UK in many pre‐university course syllabi. As such, we have identified the use of MS as a key technique that should be taught practically to undergraduates from the outset of their studies.
Andrew F. Worrall +3 more
wiley +1 more source
Detection of unseen malware threats using generative adversarial networks and deep learning models. [PDF]
Joshi C, Kumar J, Kumawat G.
europepmc +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source

