Results 51 to 60 of about 1,980,136 (283)
Estimation Method for Software Protection System based on Hardware Modules
This paper is told about a new method for estimating software protection systems based on hardware modules. It covers a new method for modeling software protection process.
T. V. Petrova, A. A. Krasnopevtsev
doaj
Efficient Memory-Protected Integration of Add-On Software Subsystems in Small Embedded Automotive Applications [PDF]
Current innovations in the automotive industry evolve mainly in the electronics and software domain. This leads to an increasing integration of additional software subsystems into already existing electronic control units (ECUs) to cope with the ...
Khan, A, Schäfer, A, Zetlmeisl, M
core +1 more source
Detection of extrachromosomal circular DNA (eccDNA) in plasma samples from EGFR‐mutated non‐small cell lung cancer patients. Plasma was collected before and during treatment with the EGFR‐tyrosine kinase inhibitor osimertinib. Plasma eccDNA was detected in all cancer samples, and the presence of the EGFR gene on eccDNA serves as a potential biomarker ...
Simone Stensgaard +5 more
wiley +1 more source
Asymmetry of Caddo Ceramics from the Washington Square Mound Site: An Exploratory Analysis [PDF]
While pursuing a study of 3D geometric morphometrics for ceramic burial vessels that often articulate with the Native American Graves Protection and Repatriation Act (NAGPRA) from the ancestral Caddo region, there have been no shortage of potentially ...
Selden, Robert Z., Jr.
core +2 more sources
Cytoplasmic p21 promotes stemness of colon cancer cells via activation of the NFκB pathway
Cytoplasmic p21 promotes colorectal cancer stem cell (CSC) features by destabilizing the NFκB–IκB complex, activating NFκB signaling, and upregulating BCL‐xL and COX2. In contrast to nuclear p21, cytoplasmic p21 enhances spheroid formation and stemness transcription factor CD133.
Arnatchai Maiuthed +10 more
wiley +1 more source
SOFTWARE APPLICATIONS FOR MOBILE AND MOBILE PROTECTION [PDF]
One of the most interesting hipothesys launched in the software industries reveals the following: software applications modify intentions, consumer behavior and all related to the motivation.
Ştefan IOVAN, Cristian IVĂNUŞ
doaj
Internationally, copyright protection is the most extensively utilized legal protection model for software. Software is protected under copyright law since it is a sort of "work." Because the requirements to qualify as works under copyright laws are not stringent, just formal creativity is required.
openaire +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
The Analysis of Software Protectors
This article presents an overview of software products designed to protect software against unauthorized copying or protectors. The author analyses advantages and disadvantages of popular protectors and also covers new tendencies, technologies and ...
V. A. Bukasov
doaj
Grounding transient response of lightning protection GTIERRAS software
A computer program developed in Matlab (GTIERRAS) from an electromagneticbased model is used to assess grounding impedances and the behavior of grounding electrodes of arbitrary shapes under lightning impulses. Impedance, currents and voltages, or other
Héctor David Gómez Montoya +3 more
doaj +1 more source

