Showing 54,521 - 54,540 results of 68,043 for search '"technology"', query time: 0.22s Refine Results
  1. 54521
  2. 54522
  3. 54523

    Vegetation types shape the soil micro-food web compositions and soil multifunctionality in Loess Plateau by Zhiming Chen, Wenjuan Kang, Renyuan He, Guang Li, Zhuzhu Luo, Zhuzhu Luo

    Published 2025-02-01
    “…., and the control vegetation Stipa bungeana on soil micro-food webs and soil multifunctionality, as well as their response mechanisms to soil environmental drivers, were investigated using High-throughput sequencing technology.ResultsC. korshinskii significantly enhanced soil physicochemical properties and soil enzyme activities by facilitating the stability of the soil micro-food web structure driven by soil bacteria and fungi and increasing the soil multifunctionality in contrast to S. bungeana. …”
    Get full text
    Article
  4. 54524
  5. 54525

    ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework by Hyeon Choe, Dongsu Kang

    Published 2025-01-01
    “…The employed Elliptic Curve Cryptography security technology provides robust encryption with minimal computational complexity, making it suitable for resource-constrained IoD environments. …”
    Get full text
    Article
  6. 54526
  7. 54527
  8. 54528
  9. 54529
  10. 54530

    Exploring RNA modifications in infectious non-coding circular RNAs by Pavel Vopalensky, Anton Škríba, Michela Chiumenti, Lucia Ďuričeková, Anna Šimonová, Ondřej Lukšan, Francesco di Serio, Beatriz Navarro, Hana Cahova

    Published 2025-02-01
    “…Here, we explore RNA modifications in the avocado sunblotch viroid (ASBVd) and the citrus exocortis viroid (CEVd), representative members of viroids replicating in chloroplasts and the nucleus, respectively, using LC – MS and Oxford Nanopore Technology (ONT) direct RNA sequencing. Although no modification was detected in ASBVd, CEVd contained approximately one m6A per RNA molecule. …”
    Get full text
    Article
  11. 54531
  12. 54532
  13. 54533
  14. 54534
  15. 54535
  16. 54536

    World Café approach: exploring the future vision of oral anticoagulants for patients with atrial fibrillation (AF) in Ireland by Colin Bradley, Stephen McCarthy, Aileen Murphy, Stephen Brosnan, Paidi O’Raghallaigh, Ann Kirby

    Published 2020-09-01
    “…The benefits of embracing technological advances for clinicians and patients were evident; however, clinicians indicate this can increase pressure on already stretched resources; coupled with institutional barriers (including scarce resources) arising from the complex nature of anticoagulation for patients with AF, which emerged strongly. …”
    Get full text
    Article
  17. 54537
  18. 54538

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  19. 54539
  20. 54540