Results 81 to 90 of about 202,881 (332)
Fault and Error Tolerance in Neural Networks: A Review
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj +1 more source
A Vulnerability to Storage Security for Cloud Computing [PDF]
Md. Afroz, Birendra Goswami
openalex +1 more source
Computational complexity of network vulnerability analysis
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time.
openaire +3 more sources
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin +12 more
wiley +1 more source
IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [PDF]
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater ...
Scholastica Mallo, Francisca Ogwueleka
doaj
DETEKSI KONDISI KETAHANAN PANGAN BERAS MENGGUNAKAN PEMODELAN SPASIAL KERENTANAN PANGAN
In 2005 and 2009, BKP and WFP has provided food security conditions in Indonesia on Food Insecurity Map which were developed using food availability, food accessibility, food absorption and food vulnerability.
Dede Dirgahayu +4 more
doaj +1 more source
ABSTRACT Introduction Neuronal pentraxin 2 (NPTX2) is a synaptic protein involved in synaptic plasticity and regulation of neuronal excitability. Lower baseline cerebrospinal fluid (CSF) NPTX2 levels have been shown to be associated with an earlier onset of mild cognitive impairment (MCI), a pre‐dementia syndrome, even after CSF Alzheimer's Disease (AD)
Juan P. Vazquez +12 more
wiley +1 more source
A process based on the role approach for the synthesis of information security models of cloud computing systems based on applied system and threat models is described; the result is a security model, expressed, for example, in recommendations for ...
E. V. Olizarovich, A. I. Brazhuk
doaj +1 more source
Evaluating application vulnerability to soft errors in multi-level cache hierarchy [PDF]
As the capacity of cache increases dramatically with new processors, soft errors originating in cache has become a major reliability concern for high performance processors.
Carlson, Trevor +3 more
core +1 more source

