Results 81 to 90 of about 2,452,454 (285)
Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees
Due to recent developments in hardware and software technologies for mobile phones, people depend on their smartphones more than ever before. Today, people conduct a variety of business, health, and financial transactions on their mobile devices.
Fahad Alswaina, Khaled Elleithy
doaj +1 more source
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li +2 more
wiley +1 more source
Finding Information Leaks in Software Using Binary Analysis
This paper presents an approach to identifying potential information leaks in software by statically analyzing its executable code. The goal is to ensure that all confidential information in memory is explicitly erased prior to execution of a given ...
I. O. Leoshkevich
doaj
Due to multi-factor coupling behavior, the performance evaluation of an accelerometer subject to high-temperature and high-impact loads poses a significant challenge during its design phase.
Ji Li +5 more
doaj +1 more source
A family of droids -- Android malware detection via behavioral modeling: static vs dynamic analysis [PDF]
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner.
Almeida, Mario +5 more
core
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Modeling and Analysis of a Tractor Diesel Engine Test Stand Structure Using the Finite Element Method [PDF]
The Diesel Engine Test Stand Structure (DETSS) is crucial in industries like automotive, agriculture, shipbuilding, military, and aerospace for engine testing and repair, ensuring safety for technicians.
Mohammad Mohammadi +2 more
doaj +1 more source
Synthesizing Imperative Programs from Examples Guided by Static Analysis
We present a novel algorithm that synthesizes imperative programs for introductory programming courses. Given a set of input-output examples and a partial program, our algorithm generates a complete program that is consistent with every example.
A Albarghouthi +6 more
core +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Stability analysis of static solutions in a Josephson junction
We present all the possible solutions of a Josephson junction with bias current and magnetic field with both inline and overlap geometry, and examine their stability. We follow the bifurcation of new solutions as we increase the junction length.
Abramowitz M +16 more
core +1 more source

