Results 81 to 90 of about 2,452,454 (285)

Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees

open access: yesIEEE Access, 2018
Due to recent developments in hardware and software technologies for mobile phones, people depend on their smartphones more than ever before. Today, people conduct a variety of business, health, and financial transactions on their mobile devices.
Fahad Alswaina, Khaled Elleithy
doaj   +1 more source

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

Finding Information Leaks in Software Using Binary Analysis

open access: yesБезопасность информационных технологий, 2010
This paper presents an approach to identifying potential information leaks in software by statically analyzing its executable code. The goal is to ensure that all confidential information in memory is explicitly erased prior to execution of a given ...
I. O. Leoshkevich
doaj  

Simulation-Based Design and Optimization of Accelerometers Subject to High-Temperature and High-Impact Loads

open access: yesSensors, 2019
Due to multi-factor coupling behavior, the performance evaluation of an accelerometer subject to high-temperature and high-impact loads poses a significant challenge during its design phase.
Ji Li   +5 more
doaj   +1 more source

A family of droids -- Android malware detection via behavioral modeling: static vs dynamic analysis [PDF]

open access: yes, 2019
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner.
Almeida, Mario   +5 more
core  

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Modeling and Analysis of a Tractor Diesel Engine Test Stand Structure Using the Finite Element Method [PDF]

open access: yesBiomechanism and Bioenergy Research
The Diesel Engine Test Stand Structure (DETSS) is crucial in industries like automotive, agriculture, shipbuilding, military, and aerospace for engine testing and repair, ensuring safety for technicians.
Mohammad Mohammadi   +2 more
doaj   +1 more source

Synthesizing Imperative Programs from Examples Guided by Static Analysis

open access: yes, 2017
We present a novel algorithm that synthesizes imperative programs for introductory programming courses. Given a set of input-output examples and a partial program, our algorithm generates a complete program that is consistent with every example.
A Albarghouthi   +6 more
core   +1 more source

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

Stability analysis of static solutions in a Josephson junction

open access: yes, 2000
We present all the possible solutions of a Josephson junction with bias current and magnetic field with both inline and overlap geometry, and examine their stability. We follow the bifurcation of new solutions as we increase the junction length.
Abramowitz M   +16 more
core   +1 more source

Home - About - Disclaimer - Privacy