Suggested Topics within your search.
Suggested Topics within your search.
-
841
Les boutiques dans les colonies de Lyon et de Vienne entre le i er s. av. et le iii e s. apr. J.-C.
Published 2019-12-01“…Which traffic patterns were generated by these architectural and functional choices? …”
Get full text
Article -
842
The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis
Published 2025-07-01“…Baseline data, PEW-related indicators, and cognitive function scores were compared between the CI and non-CI groups. …”
Get full text
Article -
843
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
844
In silico assessment of genetic variation in KCNA5 reveals multiple mechanisms of human atrial arrhythmogenesis.
Published 2017-06-01“…In the tissue model, loss-of-function mutations facilitated breakdown of excitation waves at more physiological excitation rates than the wild-type, and the generation of early-after-depolarisations promoted unidirectional patterns of excitation. …”
Get full text
Article -
845
HEE-SegGAN: A holistically-nested edge enhanced GAN for pulmonary nodule segmentation.
Published 2025-01-01“…To mitigate mode collapse, we incorporated minibatch discrimination in the discriminator, encouraging diversity in the generated samples. We also improved the loss function to better capture edge-level details and enhance segmentation precision in edge regions. …”
Get full text
Article -
846
Transcriptional analysis of a unique set of genes involved in Schistosoma mansoni female reproductive biology.
Published 2012-01-01“…Schistosomiasis affects more than 200 million people globally. The pathology of schistosome infections is due to chronic tissue inflammation and damage from immune generated granulomas surrounding parasite eggs trapped in host tissues. …”
Get full text
Article -
847
Revisiting the origin of non-volatile resistive switching in MoS2 atomristor
Published 2024-12-01“…Our rigorous computations based on Density Functional Theory (DFT) and M3GNet (deep learned forcefield) to carry out structural relaxations and molecular dynamics reveal that such a popped state is unstable and does not represent any intrinsic non-volatile resistive state. …”
Get full text
Article -
848
Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN).
Published 2009-01-01“…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
Get full text
Article -
849
Mechanism of Transcranial Magnetic Stimulation Therapy for Neuropathic Pain
Published 2024-12-01“…As a mature non-invasive neuromodulation technique, transcranial magnetic stimulation (TMS) can generate transient magnetic pulses penetrating through the skull, induce changes in cortical neuronal potentials, and affect the function and structure of the nervous system, which can not only alleviate NP-related symptoms, but also improve NP-related emotional disorders. …”
Get full text
Article -
850
Notes on Whitehead space of an algebra
Published 2002-01-01“…Let R be a ring, and denote by [R,R] the group generated additively by the additive commutators of R. …”
Get full text
Article -
851
Urbanização e novas relações cidade-campo: os processos com a criação do estado do Tocantins e de sua capital Palmas na Amazônia Oriental
Published 2020-03-01“…These are all mechanisms that aim to accumulate capital, whether in the real estate sector or in the urban functional structure, hence attracting surpluses from the countryside and the wider region. …”
Get full text
Article -
852
Statistical Analysis of Tract-Tracing Experiments Demonstrates a Dense, Complex Cortical Network in the Mouse.
Published 2016-09-01“…These extremely weak connections are topologically more random and longer distance than the strongest connections, which are topologically more clustered and shorter distance (spatially clustered). …”
Get full text
Article -
853
Hepatitis B virus genotypes A1 and A2 have distinct replication phenotypes due to polymorphisms in the HBx gene.
Published 2025-01-01“…HBVcc passaged in human liver chimeric mice (HBVmp) infected human hepatocytes more efficiently than that of the original HBVcc. …”
Get full text
Article -
854
Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect
Published 2020-01-01“…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
Get full text
Article -
855
Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors
Published 2024-12-01“…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
Get full text
Article -
856
Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS
Published 2025-06-01“…Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
Get full text
Article -
857
Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing
Published 2025-03-01“…Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. …”
Get full text
Article -
858
A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model
Published 2025-01-01“…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
Get full text
Article -
859
Knockdown of Hsc70-5/mortalin induces loss of synaptic mitochondria in a Drosophila Parkinson's disease model.
Published 2013-01-01“…We generated the first loss-of-Hsc70-5/mortalin-function Drosophila model. …”
Get full text
Article -
860
TRF1 and TRF2 form distinct shelterin subcomplexes at telomeres
Published 2025-09-01“…To quantitatively analyze shelterin function, we generated a panel of human cancer cell lines expressing HaloTagged shelterin proteins from their endogenous loci. …”
Get full text
Article