Search alternatives:
threat » treat (Expand Search)
Showing 1 - 20 results of 535 for search '(( ((significant threat) OR (significant decrease)) based ) OR ( significant increase decrease ))', query time: 0.12s Refine Results
  1. 1
  2. 2

    Kefir exhibits anti‑proliferative and pro‑apoptotic effects on colon adenocarcinoma cells with no significant effects on cell migration and invasion by Khoury, Nathalie

    Published 2014
    “…Results from RT‑PCR showed that kefir decreases the expression of transforming growth factor α (TGF‑α); and transforming growth factor‑β1 (TGF‑β1) in HT‑29 cells. …”
    Get full text
    Get full text
    Get full text
    article
  3. 3
  4. 4
  5. 5

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
  6. 6
  7. 7

    The Anti-Tumor Agent Sodium Selenate Decreases Methylated PP2A, Increases GSK3βY216 Phosphorylation, Including Tau Disease Epitopes and Reduces Neuronal Excitability in SHSY-5Y Neu... by Wesal Habbab (17346961)

    Published 2019
    “…Somewhat surprisingly, the catalytically active form, methylated PP2A (mePP2A) was significantly decreased. In close correlation to these data, the phosphorylation state of two substrate proteins, sensitive to PP2A activity, GSK3β and Tau were found to be increased. …”
  8. 8

    Significance of Avicennia Marina in the Arabian Gulf Environment: A Review by Kaiprath Puthiyapurayil Haseeba (21392966)

    Published 2025
    “…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …”
  9. 9

    Generative AI: a double-edged sword in the cyber threat landscape by Werisha Ibrar (21635153)

    Published 2025
    “…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …”
  10. 10

    Daucus carota pentane-based fractions arrest the cell cycle and increase apoptosis in MDA-MB-231 breast cancer cells by Shebaby, Wassim N.

    Published 2014
    “…The increase in apoptosis in response to treatment was also apparent in the increase in BAX and the decrease in Bcl-2 levels as well as the proteolytic cleavage of both caspase-3 and PARP as revealed by Western blot. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions by Muhammad J. Shehab (16905174)

    Published 2025
    “…Through this analysis, we aim to provide an in-depth survey aimed at strengthening O-Cloud-based telecom networks against cybersecurity threats and ensuring data and services’ integrity. …”
  12. 12

    A slow but steady nanoLuc: R162A mutation results in a decreased, but stable, nanoLuc activity by Wesam S. Ahmed (10170053)

    Published 2024
    “…Here, we combined molecular dynamics (MD) simulation and mutational analysis to show that the R162A mutation results in a decreased but stable <u>bioluminescence </u>activity of NLuc in living cells and in vitro. …”
  13. 13
  14. 14
  15. 15

    Decreased Interfacial Dynamics Caused by the N501Y Mutation in the SARS-CoV-2 S1 Spike:ACE2 Complex by Wesam S. Ahmed (10170053)

    Published 2022
    “…In this regard, the recent SARS-CoV-2 alpha, beta, and gamma variants (B.1.1.7, B.1.351, and P.1 lineages, respectively) are of great significance in that they contain several mutations that increase their transmission rates as evident from clinical reports. …”
  16. 16

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches by ALHAJERI, RASHED ABDULLA

    Published 2018
    “…Periodic based automatic cleaning showed decreases in improvement of between 164.64% to 245.34%. …”
    Get full text
  17. 17

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…One of the well-known designs of RDH is the difference expansion (DE) method. In the DE-based RDH method, finding spaces that create less distortion in the marked image is a significant challenge, and has a high insertion capacity. …”
    Get full text
  18. 18

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis by Hanane Amirat (23126110)

    Published 2025
    “…<p dir="ltr">The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats. …”
  19. 19
  20. 20