Results 51 to 60 of about 23,723 (266)

Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods

open access: yesSensors
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim   +6 more
doaj   +1 more source

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov   +3 more
wiley   +1 more source

SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH

open access: yesTASK Quarterly, 2013
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj  

Fault and Error Tolerance in Neural Networks: A Review

open access: yesIEEE Access, 2017
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj   +1 more source

Cell‐cycle‐specific lesion evolution rather than inhibition of double‐strand‐break repair underpins cisplatin radiosensitization

open access: yesMolecular Oncology, EarlyView.
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu   +10 more
wiley   +1 more source

GreenBERT: A lightweight green transformer for automated prediction of software vulnerability scores

open access: yesArray
Timely assessment of software vulnerabilities is critical for effective patch prioritization, yet manual Common Vulnerability Scoring System (CVSS) scoring remains slow and resource-intensive.
Seyedeh Leili Mirtaheri   +3 more
doaj   +1 more source

Computational complexity of network vulnerability analysis

open access: yesActa Universitatis Sapientiae, Informatica, 2022
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time.
openaire   +3 more sources

Anticancer sensitivities and biological characteristics of HCT116 cells resistant to the selective poly(ADP‐ribose) glycohydrolase inhibitor

open access: yesFEBS Open Bio, EarlyView.
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley   +1 more source

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2019
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater ...
Scholastica Mallo, Francisca Ogwueleka
doaj  

Home - About - Disclaimer - Privacy