Showing 41,341 - 41,360 results of 53,445 for search '"system"', query time: 0.16s Refine Results
  1. 41341

    Similarities and Differences in the Glycosylation Mechanisms in Prokaryotes and Eukaryotes by Anne Dell, Alaa Galadari, Federico Sastre, Paul Hitchen

    Published 2010-01-01
    “…Recent years have witnessed a rapid growth in the number and diversity of prokaryotic proteins shown to carry N- and/or O-glycans, with protein glycosylation now considered as fundamental to the biology of these organisms as it is in eukaryotic systems. This article overviews the major glycosylation pathways that are known to exist in eukarya, bacteria and archaea. …”
    Get full text
    Article
  2. 41342

    Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…The proposed optimizations enhance post-processing efficiency and scalability, enabling practical deployment in bandwidth-limited environments like IoT networks, secure financial systems, and defense communications, thereby supporting broader adoption of quantum communication systems.…”
    Get full text
    Article
  3. 41343

    Bermudagrass Management in the Southern Piedmont U.S. IV. Soil Surface Nitrogen Pools by Alan J. Franzluebbers, John A. Stuedemann

    Published 2001-01-01
    “…We could account for more of the applied N under grazed systems (76–82%) than under ungrazed systems (35–71%). …”
    Get full text
    Article
  4. 41344
  5. 41345
  6. 41346
  7. 41347

    Cyber Insurance Adoption and Digitalisation in Small and Medium-Sized Enterprises by Nazim Taskin, Aslı Özkeleş Yıldırım, Handan Derya Ercan, Martin Wynn, Bilgin Metin

    Published 2025-01-01
    “…Using the Technology–Organisation–Environment–Individual (TOE-I) model as a top-line conceptual framework, the article finds that cyber insurance policy adoption has facilitated a more rapid and secure digitalisation process and that the mitigation of financial risk associated with cyberattacks has allowed companies to invest more widely in information technologies and systems. The article clearly has its limitations, in that it is based on primary research in one European country, but the authors believe that it nevertheless provides some new insights into the potential benefits of cyber insurance, and the key issues SMEs must consider when considering adopting a cyber insurance policy. …”
    Get full text
    Article
  8. 41348
  9. 41349
  10. 41350
  11. 41351
  12. 41352
  13. 41353
  14. 41354

    Extending TextAE for annotation of non-contiguous entities by Jake Lever, Russ Altman, Jin-Dong Kim

    Published 2020-06-01
    “…Most text annotation systems, that enable users to view and edit entity annotations, do not support non-contiguous entities. …”
    Get full text
    Article
  15. 41355

    Development Features of the FSES for Tiered and Continuous Higher Education by A. I. Altukhov, M. A. Skvaznikov, A. A. Shekhonin

    Published 2020-03-01
    “…The article discusses the dynamics of the development of federal state educational standards (FSES) for the preparation of bachelors, masters and specialists in the field of photonics, instrumentation, optical and biotechnological systems and technologies over the past twenty-five years. …”
    Get full text
    Article
  16. 41356

    Production scheduling with multi-robot task allocation in a real industry 4.0 setting by Zohreh Shakeri, Khaled Benfriha, Mohsen Varmazyar, Esma Talhi, Anthony Quenehen

    Published 2025-01-01
    “…Abstract The demand for efficient Industry 4.0 systems has driven the need to optimize production systems, where effective scheduling is crucial. …”
    Get full text
    Article
  17. 41357
  18. 41358
  19. 41359
  20. 41360

    Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization by Olga Ilina, Maxim Tereshonok, Vadim Ziyadinov

    Published 2025-01-01
    “…Object detection in images is a fundamental component of many safety-critical systems, such as autonomous driving, video surveillance systems, and robotics. …”
    Get full text
    Article