Results 21 to 30 of about 32,602 (220)
The role of the host—Neutrophil biology
Abstract Neutrophilic polymorphonuclear leukocytes (neutrophils) are myeloid cells packed with lysosomal granules (hence also called granulocytes) that contain a formidable antimicrobial arsenal. They are terminally differentiated cells that play a critical role in acute and chronic inflammation, as well as in the resolution of inflammation and wound ...
Iain L. C. Chapple +4 more
wiley +1 more source
A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks
Deep neural networks (DNNs) are highly vulnerable to neural Trojan attacks. To carry out such an attack, an adversary retrains a DNN with poisoned data or modifies its parameters to produce incorrect output.
Shahram Ghahremani +3 more
doaj +1 more source
Periodontitis and atherosclerotic cardiovascular disease: A critical appraisal
Abstract In spite of intensive research efforts driving spectacular advances in terms of prevention and treatments, cardiovascular diseases (CVDs) remain a leading health burden, accounting for 32% of all deaths (World Health Organization. “Cardiovascular Diseases (CVDs).” WHO, February 1, 2017, https://www.who.int/news‐room/fact‐sheets/detail ...
Maria Clotilde Carra +3 more
wiley +1 more source
Hardware Trojan Detection Method Based on Hidden Markov Model [PDF]
Hardware Trojan causes a huge threat to the reliability of the integrated circuit chips,so this paper proposes a Trojan detection method based on Hidden Markov Model(HMM).It extracts the characteristic parameters of original circuit data,trains the ...
GAO Zhenbin,BAI Xue,YANG Song,HE Jiaji
doaj +1 more source
Threshold quantum cryptograph based on Grover's algorithm [PDF]
Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state.
Cai +20 more
core +2 more sources
Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids
Trojan horse technology institutes a potentially promising strategy to bring together a diagnostic or cell-based drug design and a delivery platform.
Amal A. Aziz +2 more
doaj +1 more source
The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature ...
Sohaib Aslam +4 more
doaj +1 more source
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software ...
Anju P. Johnson +2 more
doaj +1 more source
The Absolute Magnitude Distribution of Kuiper Belt Objects [PDF]
Here we measure the absolute magnitude distributions (H-distribution) of the dynamically excited and quiescent (hot and cold) Kuiper Belt objects (KBOs), and test if they share the same H-distribution as the Jupiter Trojans.
Batygin, Konstantin +4 more
core +3 more sources
Due to the globalization of the design and fabrication process of integrated circuits (ICs), ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works assume that the testing stage is trustworthy.
Mingfu Xue +3 more
doaj +1 more source

