-
1121
-
1122
Estimating fish stock biomass using a Bayesian state-space model: accounting for catchability change due to technological progress
Published 2024-12-01“…The assessment of trends in fish stocks using long-term time-series data is important for effective fisheries resource management. Despite technological advancements in recent decades, the resulting increase in fisheries catch potential with applied effort is often not adequately considered in stock assessments. …”
Get full text
Article -
1123
Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications
Published 2025-05-01“…Abstract Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments. …”
Get full text
Article -
1124
Comprehensive analysis of the NAC transcription factor gene family in Sophora tonkinensis Gagnep
Published 2025-04-01Get full text
Article -
1125
The global, regional, and national brain and CNS cancers burden and trends from 1990 to 2021
Published 2025-06-01Get full text
Article -
1126
mbctools: A User-Friendly Metabarcoding and Cross-Platform Pipeline for Analyzing Multiple Amplicon Sequencing Data across a Large Diversity of Organisms
Published 2024-12-01“…It provides functions for various tasks such as dereplication, clustering, chimera detection, and taxonomic assignment. …”
Get full text
Article -
1127
Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes
Published 2005-06-01“…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
Get full text
Article -
1128
Quantification of glucagon and oxyntomodulin by protein precipitation-immunoaffinity enrichment-LC-MS/MS
Published 2025-04-01“…A glucagon calibration material was sourced commercially and characterized for purity and concentration by high-performance liquid chromatography-ultraviolet detection and amino acid analysis. …”
Get full text
Article -
1129
-
1130
Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset
Published 2025-06-01“…Many of them, such as rule-based methods, machine learning techniques, and neural networks, also struggle to detect complex vulnerabilities due to limited data availability. …”
Get full text
Article -
1131
Impulse Shaping Method Based on Bayesian Deconvolution
Published 2025-04-01“…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
Get full text
Article -
1132
Examination and Tracing of Stable Isotopes of Carbon and Hydrogen in Diesel Oil from Different Regions
Published 2025-03-01“…Diesel is often used as an accelerant in arson cases, so identifying its source is crucial to the investigation. Stable isotope analysis is a method for detecting molecular elements at the element level. …”
Get full text
Article -
1133
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1134
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1135
-
1136
-
1137
Exploring the role of mitochondrial metabolism and immune infiltration in myocardial infarction: novel insights from bioinformatics and experimental validation
Published 2025-05-01“…This study aimed to clarify the roles of mitochondrial metabolism and immune infiltration in MI, using a combination of bioinformatics analyses and experimental validation.MethodsMI chip data (GSE96561, GSE181872, and GSE183272) were obtained from the Gene Expression Omnibus (GEO) database, and mitochondrial gene data were sourced from the MitoCarta3.0 database. Differentially expressed genes (DEGs) were identified and subjected to functional enrichment analyses. …”
Get full text
Article -
1138
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
Get full text
Article -
1139
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
1140