Search results for "Cryptography"

showing 10 items of 657 documents

The HIF1α-PFKFB3 Pathway: A Key Player in Diabetic Retinopathy

2021

Abstract Diabetic retinopathy (DR) is the leading cause of blindness for adults in developed countries. Both microvasculopathy and neurodegeneration are implicated in mechanisms of DR development, with neuronal impairment preceding microvascular abnormalities, which is often underappreciated in the clinic. Most current therapeutic strategies, including anti-vascular endothelial growth factor (anti-VEGF)-antibodies, aim at treating the advanced stages (diabetic macular edema and proliferative diabetic retinopathy) and fail to target the neuronal deterioration. Hence, new therapeutic approach(es) intended to address both vascular and neuronal impairment are urgently needed. The hypoxia-induci…

medicine.medical_specialtyPhosphofructokinase-2Endocrinology Diabetes and MetabolismClinical BiochemistryMitochondrionmedicine.disease_causeBiochemistryangiogenesisEndocrinologyPFKFB3Internal medicineDiabetes MellitusmedicineHumansHIF1αbusiness.industryBiochemistry (medical)neurodegenerationDiabetic retinopathyMini-Reviewmedicine.diseasediabetic retinopathyEndocrinologyKey (cryptography)businessAcademicSubjects/MED00250Oxidative stressSignal TransductionThe Journal of Clinical Endocrinology & Metabolism
researchProduct

Models and Model Transformations Within Web Applications

2016

Unlike traditional single-user desktop applications, web applications have separated memory and computational resources (the client and the server side) and have to deal with multiple user accounts. This complicates the development process. Is there some approach of creating web applications without thinking about web-specific aspects, as if we are developing stand-alone desktop applications? We say, “yes”, and that is where models and model transformations come in handy. The proposed model-driven approach simplifies the development of web applications and makes it possible to use a single code base for deploying both desktop and web-based versions of the software.

medicine.medical_specialtySoftwarebusiness.industryComputer scienceProcess (engineering)medicineCode (cryptography)Web applicationBase (topology)Software engineeringbusinessWeb modelingServer-side
researchProduct

Software/Hardware Issues in Modelling Insect Brain Architecture

2011

The concept of cognitive abilities is commonly associated to humans and animals like mammals, birds and others. Nevertheless, in the last years several research groups have intensified the studies on insects that posses a much simpler brain structure even if they are able to show interesting memory and learning capabilities. In this paper a survey on some key results obtained in a joint research activity among Engineers and Neurogeneticians is reported. They were focussed toward the design and implementation of a model of the insect brain inspired by the Drosophila melanogaster. Particular attention was paid to the main neural centers the Mushroom Bodies and the Central Complex. Moreover a …

melanogasterStructure (mathematical logic)Engineeringhybrid robotbusiness.industryController (computing)Insect brain; Drosophila; melanogaster; hybrid robot; dynamic simulationinsect brainCognitionDrosophila melanogasterSoftwareEmbodied cognitionKey (cryptography)RobotDrosophiladynamic simulationArchitecturebusinessComputer hardwareinsect brain; hybrid robot; Insect brain Drosophila melanogaster
researchProduct

Erradicando la xenofobia y la aporofobia desde la compasión ética como capacidad clave de la neuroeducación moral

2021

Drawing on the contributions of some of the most recent and relevant studies on neuroethics and moral neuroeducation, this paper undertakes an analysis of compassion. In order to focus on the results of this neuroscientific research a reductionist naturalist framework is set aside in order to embrace the broader outlook of a moral neuroeducation that, firstly, refuses to reduce its normative character to the human capacity for evolutionary adaptation; and, secondly, seeks to locate within the brain the neuronal foundations for the development of a capacity for compassion towards those of one’s own community, and also those from outside it. Thereby, this capacity for compassion moves beyond …

moral neuroeducationmedia_common.quotation_subjectcompasiónaporophobiaB1-5802compassionCompassionneuroethicsxenophobiaBlacras socialesempatíaSociologyPhilosophy (General)empathymedia_commonPhilosophy. Psychology. ReligionneuroéticaEnvironmental ethicsneuroeducación moralÈtica socialPhilosophyEducational neuroscienceXenophobiaKey (cryptography)
researchProduct

Towards a comprehensive understanding of new regional industrial path development

2019

Path creation is a key concept in economic geography. So far, particularly scholars within evolutionary economic geography have pioneered research on this topic. This paper critically discusses the...

multi-actor approach05 social sciences0211 other engineering and technologies0507 social and economic geographyPath creationInformationSystems_DATABASEMANAGEMENTGeneral Social Sciences021107 urban & regional planning02 engineering and technologynew regional industrial path developmentinter-path relationsDevelopment (topology)Political sciencePath (graph theory)path creationKey (cryptography)Regional sciencemultiscalar approach050703 geographyGeneral Environmental Science
researchProduct

Student participation in peer interaction

2021

This study explores how students deal with material resources in their peer interaction when working in pairs in an open-ended problem-solving task. The productive use of material resources can be expected to support successful peer work. However, research into social phenomena in peer interaction is needed in order to identify and describe productive and less productive forms of dealing with material resources as students participate in open-ended problem-solving tasks. Consequently, this explorative study responds to this research need. Based on multimodal data, including video recordings, transcribed talk and the written contributions from four pairs of Year 7 students aged 12-13 years, …

open-ended problem-solving taskmedia_common.quotation_subjectForegroundingDevelopment theorylcsh:Education (General)EducationTask (project management)video studyNegotiationWork (electrical)material resourcesOrder (exchange)Material resourcesKey (cryptography)Mathematics educationparticipationlcsh:L7-991lcsh:Science (General)student pairsmedia_commonlcsh:Q1-390LUMAT
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Location-Awareness for Failure Management in Cellular Networks: An Integrated Approach

2021

Recent years have seen the proliferation of different techniques for outdoor and, especially, indoor positioning. Still being a field in development, localization is expected to be fully pervasive in the next few years. Although the development of such techniques is driven by the commercialization of location-based services (e.g., navigation), its application to support cellular management is considered to be a key approach for improving its resilience and performance. When different approaches have been defined for integrating location information into the failure management activities, they commonly ignore the increase in the dimensionality of the data as well as their integration into th…

paikkatiedotProcess (engineering)Computer sciencecellular networksmedia_common.quotation_subjectReliability (computer networking)matkaviestinverkot02 engineering and technologylcsh:Chemical technologycomputer.software_genreverkonhallintaBiochemistryCommercializationArticleField (computer science)Analytical Chemistry0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringfailure managementlcsh:TP1-1185Electrical and Electronic EngineeringResilience (network)Instrumentationmedia_commonviatLocation awareness020206 networking & telecommunications020302 automobile design & engineeringlocation-awarenessAtomic and Molecular Physics and OpticsRisk analysis (engineering)positioningKey (cryptography)Cellular networkPsychological resiliencecomputerlangattomat verkot
researchProduct

Register Variation in Electronic Business Correspondence

2011

Electronic correspondence is a highly dynamic genre within the business world in which Register Variation (RV) is frequently used as a tool to improve communication but it often can lead to misunderstanding. In order to shed some light on this still unexplored area, the present study firstly offers a practical approach to classify and analyse RV within professional communication. After this, it reviews previous studies on email writing to apply their findings to this approach and, in the third part of the study, a corpus of recent business emails in English is analysed to examine how the key parameters of RV are currently used within this genre. The results will show that, not only the cont…

register variationCultural StudiesRegister (sociolinguistics)Linguistics and LanguageemailLiterature and Literary TheoryComputer scienceContext (language use)33 - EconomíaLengua inglesa comercialcorpus analysislcsh:PR1-9680Language and LinguisticsEducation81 - Lingüística y lenguasbusiness Englishlcsh:English languageElectronic businesselectronic correspondenceCorrespondencia comercialProfessional communicationData scienceDocumentos electrónicoslcsh:English literatureVariation (linguistics)Order (business)Key (cryptography)lcsh:PE1-3729
researchProduct

A black-box, general purpose quadratic self-consistent field code with and without Cholesky Decomposition of the two-electron integrals

2021

We present the implementation of a quadratically convergent self-consistent field (QCSCF) algorithm based on an adaptive trust-radius optimisation scheme for restricted open-shell Hartree���Fock (ROHF), restricted Hartree���Fock (RHF), and unrestricted Hartree���Fock (UHF) references. The algorithm can exploit Cholesky decomposition (CD) of the two-electron integrals to allow calculations on larger systems. The most important feature of the QCSCF code lies in its black-box nature ��� probably the most important quality desired by a generic user. As shown for pilot applications, it does not require one to tune the self-consistent field (SCF) parameters (damping, Pulay's DIIS, and other simil…

self-consistent fieldField (physics)Nuclear TheoryBiophysicsHartree–Fock methodsecond-orderFOS: Physical sciencesHartree–FockQuadratic equationBlack boxPhysics - Chemical PhysicsPhysics::Atomic and Molecular ClustersCode (cryptography)Applied mathematicsPhysical and Theoretical ChemistryPhysics::Chemical PhysicsMolecular BiologyMathematicsQuadratic growthCholesky decomposition; Hartree–Fock; Levenberg–Marquardt; second-order; self-consistent fieldChemical Physics (physics.chem-ph)Condensed Matter PhysicsLevenberg–Marquardt algorithmLevenberg–MarquardtCholesky decompositionCholesky decomposition
researchProduct