Results 91 to 100 of about 1,157,333 (342)

Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis

open access: yesAdvanced Science, EarlyView.
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu   +4 more
wiley   +1 more source

Secure Development - Web Application Security.

open access: yesIOSR Journal of Computer Engineering, 2013
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire   +1 more source

Performance Evaluation of Malaysian University Website [PDF]

open access: yes, 2008
In recent years, many people have devoted their efforts to the issue of Web site performance. Web performance testing can be divided into many categories.
Jati, Handaru
core  

On the Origins of Toughness in Corymbia calophylla (Marri Tree) Nuts

open access: yesAdvanced Science, EarlyView.
We uncover the natural toughening mechanisms of the marri nut, including fiber pullout, crack deflection, and a viscoelastic matrix, which enable exceptional energy absorption and ductility comparable to Teflon, with an elastic modulus similar to acrylic.
Wegood M. Awad   +7 more
wiley   +1 more source

An Improved Detection of Cross-Site Scripting (XSS) Attacks Using a Hybrid Approach Combining Convolutional Neural Networks and Support Vector Machine

open access: yesJournal of Cybersecurity and Privacy
Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of ...
Abdissamad Ayoubi   +3 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Myeloid‐Derived Grancalcin Promotes Periodontal Inflammation and Pathological Bone Remodeling in Periodontitis

open access: yesAdvanced Science, EarlyView.
Grancalcin (GCA), a myeloid‐derived protein, is enriched in gingival tissues of periodontitis patients and mouse models. Through interactions with CD44 and activation of MYH9, GCA promotes NF‐κB signaling and exacerbates periodontal inflammation and bone loss.
Min Zhou   +6 more
wiley   +1 more source

Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]

open access: yes, 2011
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza   +4 more
core  

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

General Aspects of some Causes of Web Application Vulnerabilities [PDF]

open access: yesMemoirs of the Scientific Sections of the Romanian Academy, 2015
Because web applications are complex software systems in constant evolution, they become real targets for hackers as they provide direct access to corporate or personal data.
Mironela Pîrnău
doaj  

Home - About - Disclaimer - Privacy