Search alternatives:
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
961
-
962
Lipoprotein N-terminal modification in Bacillus: a new paradigm for extracellular acetylation and species-dependent Toll-like receptor 2 immunomodulation
Published 2025-08-01“…While Ac-LP biosynthetic pathway genes appear to be universally conserved in all Bacillus spp., those associated with pathogenic lineages have often lost function. In B. anthracis strains, LhaT has been inactivated by insertion of poly-tyrosine runs of variable length that favors chemotype conversion to lyso-LP and evasion of TLR2 detection. …”
Get full text
Article -
963
Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress
Published 2024-12-01“…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
Get full text
Article -
964
-
965
Individual ZnO–Ag Hybrid Nanorods for Synergistic Fluorescence Enhancement Towards Highly Sensitive and Miniaturized Biodetection
Published 2025-04-01“…Hybrid nanostructures can be engineered to exhibit superior functionality beyond the level attainable from each of the constituent nanomaterials by synergistically integrating their unique properties. …”
Get full text
Article -
966
Comparing soil microbial diversity in smallholder plantain backyard gardens and main farms in Western and Central Africa
Published 2025-08-01“…Beneficial genera such as Bacillus, Streptomyces, Bradyrhizobium, and Paenibacillus were also detected. Functional predictions based on COG and KEGG databases indicated notable differences in microbial functional potential between the two settings. …”
Get full text
Article -
967
Comprehensive analysis of the NAC transcription factor gene family in Sophora tonkinensis Gagnep
Published 2025-04-01Get full text
Article -
968
ParticleHolography.jl: Holographic particle measurement in Julia
Published 2025-02-01“…This comprehensive software provides an end-to-end processing pipeline encompassing a wide range of functionalities: preprocessing, including background removal and camera calibration; three-dimensional reconstruction through diffraction calculations; particle analysis, including detection and tracking; and result visualization. …”
Get full text
Article -
969
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
970
Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid
Published 2024-12-01“…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
Get full text
Article -
971
iMeta Conference 2024: Building an innovative scientific research ecosystem for microbiome and One Health
Published 2024-12-01Get full text
Article -
972
-
973
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
974
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
975
-
976
JASBO: Jaya Average Subtraction Based Optimization with Deep Learning Model for Multi-Classification of Infectious Disease from Unstructured Data
Published 2024-10-01“…Medical documents are considered an essential source for modern, invented, and robust analysis methods for accurate infection diagnoses. …”
Get full text
Article -
977
-
978
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
Get full text
Article -
979
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
980