Showing 121 - 140 results of 229 for search 'complex optimization vulnerabilities', query time: 0.09s Refine Results
  1. 121

    Gag-Pol processing during HIV-1 virion maturation: a systems biology approach. by Balázs Könnyű, S Kashif Sadiq, Tamás Turányi, Rita Hírmondó, Barbara Müller, Hans-Georg Kräusslich, Peter V Coveney, Viktor Müller

    Published 2013-01-01
    “…The process has several layers of complexity (multiple cleavage sites and substrates; multiple enzyme forms; PR auto-processing), which calls for a systems level approach to identify key vulnerabilities and optimal treatment strategies. …”
    Get full text
    Article
  2. 122

    Ris-assisted integrated sensing and communication: applications, challenges and usecase scenario by Garima Chopra, Suhaib Ahmed

    Published 2025-06-01
    “…This study also integrates mathematical models to optimize path loss, enhance signal quality, and improve resource allocation. …”
    Get full text
    Article
  3. 123
  4. 124

    The robust-fragile duality of the ATLAS collaboration network by Rubén Rodríguez-Casañ, María J. Palazzi, Albert Solé-Ribalta, Markus Nordberg, Agustí Canals, Javier Borge-Holthoefer

    Published 2025-07-01
    “…Abstract Big Science initiatives like the ATLAS experiment at CERN exemplify the scale and complexity of modern collaborative research. With thousands of scientists and institutions from over 40 countries, ATLAS represents a global effort to uncover fundamental aspects of particle physics. …”
    Get full text
    Article
  5. 125

    Multi-Party Controlled Semi-Quantum Dialogue Protocol Based on Hyperentangled Bell States by Meng-Na Zhao, Ri-Gui Zhou, Yun-Hao Feng

    Published 2025-06-01
    “…This encoding mechanism assigns values to each character by constructing a Huffman tree, generating optimal prefix codes that significantly optimize the storage space complexity for the classical participant. …”
    Get full text
    Article
  6. 126

    Novel treatment approaches utilizing antibody-drug conjugates in breast cancer by Andrew A. Davis, Jennifer Hesse, Patrícia M. R. Pereira, Cynthia X. Ma

    Published 2025-05-01
    “…We further demonstrate the complexity and challenges of improving ADCs to enhance targeting of tumor vulnerabilities while limiting toxicity through rationale drug development strategies to enhance the therapeutic window, linker technology, and payload variability to continue to improve outcomes for patients with breast cancer.…”
    Get full text
    Article
  7. 127

    Effects of simplicial centrality on robustness of higher-order multiplex world trade networks by Zhuoming Ren, Wan Wang, Tongfeng Weng, Wenli Du

    Published 2024-01-01
    “…Simplicial centrality on robustness of multiplex world trade networks under random and targeted attacks reveals that the complex connectivity of higher-order levels renders them more vulnerable post-attack. …”
    Get full text
    Article
  8. 128

    Risk Transmission and Resilience of China’s Corn Import Trade Network by Jun Wu, Jing Zhu

    Published 2025-04-01
    “…The global corn trade is an important pillar of the agricultural economy, but its supply chain is vulnerable to geopolitical conflicts, climate change, and market volatility. …”
    Get full text
    Article
  9. 129

    Energy poverty from a life cycle sustainability assessment perspective by T.D. Gates, M. Hannouf, D. Gebremedhin, T.D. Beyene, G. Assefa, I.D. Gates

    Published 2025-09-01
    “…Energy poverty (EP) and energy security (ES) are complex, multi-dimensional challenges with profound environmental, economic, and social implications that persist in both developed and developing nations. …”
    Get full text
    Article
  10. 130

    An Assessment of University Campus Morphological Resilience Under Typical Disaster Scenarios: A Case Study of the Two Campuses of Tianjin University by Yuqi Han, Hao Gao

    Published 2025-06-01
    “…Amid intensifying climatic threats, university campuses are increasingly vulnerable. Morphological resilience offers a practical pathway to strengthen disaster response in higher-education institutions. …”
    Get full text
    Article
  11. 131

    Assessment and Enhancement of Coastal Community Resilience Strategies: A Case Study of Wuyuan Bay in Xiamen by Xu Mengjie, Liu Xingzhao, Xie Huili, Zhang Yang, Dai Hongxia, Zhou Yanhai, Huang Faming

    Published 2025-04-01
    “…Wetland ecosystems notably reduced drainage system loads through hydrological regulation and flood detention mechanisms. (4) Optimization strategies for coastal community resilience. …”
    Get full text
    Article
  12. 132

    Uncertainty-aware Fourier ptychography by Ni Chen, Yang Wu, Chao Tan, Liangcai Cao, Jun Wang, Edmund Y. Lam

    Published 2025-07-01
    “…We introduce Uncertainty-Aware FP (UA-FP), a comprehensive framework that simultaneously addresses multiple system uncertainties without requiring complex calibration and data collection procedures. …”
    Get full text
    Article
  13. 133

    USING THE ANYLOGIC ENVIRONMENT FOR MODELING AND ANALYSIS OF THE INFORMATION SECURITY AUDIT PROCESS by Kamilla M. Khuranova, Igor D. Kologorov, Sergey A. Reznichenko, Leonid N. Kessarinskiy

    Published 2025-05-01
    “…The relevance of the study is due to the increasing complexity of cyber threats and the need to optimize the resources spent on ensuring the security of information systems. …”
    Get full text
    Article
  14. 134

    Drug‐Related Side Effects and Contributing Risk Factors in Children With Congenital Heart Disease: A Cross‐Sectional Study by Esmaeel Toni, Haleh Ayatollahi, Reza Abbaszadeh, Alireza Fotuhi Siahpirani

    Published 2025-05-01
    “…Future research should prioritize longitudinal studies to establish causality relationships, optimize treatment protocols, and improve medication safety in this vulnerable population.…”
    Get full text
    Article
  15. 135

    Construction and Overall Protection of Ecological and Marine Cultural Composite Landscape Network in Quanzhou, Fujian by Dongfang LU, Yaru ZHENG, Tianteng HAN, Shunhe CHEN

    Published 2025-07-01
    “…Therefore, in the optimization of the complex landscape corridor, we should focus on the restoration of the ecological problems in the coastal areas and the central urban areas, and transform the cultural-oriented network into an ecological-cultural dual-function network Secondly, in the interior of the basic coordination section corridor, should focus on the ecological function and regional characteristics to enhance the cultural value. …”
    Get full text
    Article
  16. 136
  17. 137

    Amino acid derivatives of natural chlorins as a platform for the creation of targeted photosensitizers in oncology by A. F. Mironov, P. V. Ostroverkhov, S. I. Tikhonov, V. A. Pogorilyy, N. S. Kirin, O. O. Chudakova, A. A. Tsygankov, M. A. Grin

    Published 2021-01-01
    “…The chelating ability of DPBP conjugate with lysine was shown, and its Sn(IV) complex was obtained.Conclusions. Biological testing of DPBP with MSO and BSO showed a 5–6-fold increase in photoinduced cytotoxicity compared to the parent DPBP PS. …”
    Get full text
    Article
  18. 138

    ResilioMate: A Resilient Multi-Agent Task Executing Framework for Enhancing Small Language Models by Yubing Xiong, Mingrui Huang, Xuechen Liang, Meiling Tao

    Published 2025-01-01
    “…Recent advances in large language models (LLMs) have been limited by their processing requirements and vulnerability to adversarial assaults, whilst short language models (SLMs) struggle with performance consistency in complex tasks. …”
    Get full text
    Article
  19. 139

    Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems by Ariadna Claudia Moreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado, Luis Javier García Villalba

    Published 2025-01-01
    “…Given the complexity of the tests, time constraints, and the specialized level of expertise required for pentesting, analysis and exploitation tools are commonly used. …”
    Get full text
    Article
  20. 140

    Secure Quantum Communication With Multi-Users in Quantum Networks by As'Ad Mahmoud As'Ad Alnaser, Hazem Moh'D Said Hatamleh, Nawaf Abdualziz Almolhis, Salahaldeen Duraibi, Yahya Alqahtani

    Published 2025-01-01
    “…Security is then further optimized with the MUQQ-ESTMP GHZ based on Multi-User Quantum Protocol, (MUQPQ), where it optimizes queries across several users. …”
    Get full text
    Article