Results 41 to 50 of about 6,188,449 (296)

Future management needs of a "software-driven" science community

open access: yes, 2010
The work of astronomers is getting more complex and advanced as the progress of computer development occurs. With improved computing capabilities and increased data flow, more sophisticated software is required in order to interpret, and fully exploit ...
Moeller-Nilsson, Ole, Nilsson, Kim K.
core   +1 more source

Novel Genetic Risk Factor Identified for L‐Asparaginase‐Induced Pancreatitis in Pediatric Patients With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background L‐asparaginase is a critical component in treatment protocols for pediatric acute lymphoblastic leukemia. Acute pancreatitis reactions can necessitate delays and, in some cases, discontinuation of L‐asparaginase, which compromises outcomes.
Edward J. Raack   +39 more
wiley   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. This paper addresses the general events of
Suman Bhunia   +4 more
doaj   +1 more source

Commensal observing with the Allen Telescope array: software command and control

open access: yes, 2010
The Allen Telescope Array (ATA) is a Large-Number-Small-Diameter radio telescope array currently with 42 individual antennas and 5 independent back-end science systems (2 imaging FX correlators and 3 time domain beam formers) located at the Hat Creek ...
Ackermann, Robert   +8 more
core   +1 more source

Miniature exoplanet radial velocity array I: design, commissioning, and early photometric results [PDF]

open access: yes, 2015
The MINiature Exoplanet Radial Velocity Array (MINERVA) is a US-based observational facility dedicated to the discovery and characterization of exoplanets around a nearby sample of bright stars.
Barnes, Stuart I.   +28 more
core   +6 more sources

Intraoperative Collection of Ascitic Fluid With Intra‐ or Postoperative Reinfusion in Ovarian Cancer: Safety and Feasibility of a Roller Pumping Method

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka   +7 more
wiley   +1 more source

Automatic Sugarcane Disease Detection and Outbreak Alert System using Deep Learning

open access: yesJISR on Computing
Agriculture Agriculture is a vital sector in Pakistan, with sugarcane being the second-largest crop. However, the industry faces challenges due to crop diseases, prompting the need for innovative solutions.
Munaf Rashid   +4 more
doaj   +1 more source

Genetic basis of between-individual and within-individual variance of docility [PDF]

open access: yes, 2017
Funded by Alces Software UCLA Academic Senate Division of Life Sciences National Geographic Society National Science Foundation. Grant Numbers: IDBR-0754247, DEB-1119660, DBI-0242960, DBI-0731346 University of Aberdeen Data deposited at Dryad: doi:10 ...
Blumstein, D T   +3 more
core   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

MATADOR: a magic matrix-based framework for tamper detection and image recovery

open access: yesJournal of King Saud University: Computer and Information Sciences
Ensuring the integrity and authenticity of digital medical images is crucial for healthcare security and digital forensics, as image tampering can have serious consequences.
Thilina Mendis   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy