Results 31 to 40 of about 253,120 (274)
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park+6 more
wiley +1 more source
DSEP Fulcrum: Dynamic Sparsity and Expansion Packets for Fulcrum Network Coding
Fulcrum coding combines a high-field outer Random Linear Network Coding (RLNC) that generates outer coding expansion packets with a small-field inner RLNC that combines the source packets and the outer coding expansion packets.
Vu Nguyen+5 more
doaj +1 more source
5G System Security Analysis [PDF]
Fifth generation mobile networks (5G) are currently being deployed by mobile operators around the globe. 5G acts as an enabler for various use cases and also improves the security and privacy over 4G and previous network generations. However, as recent security research has revealed, the standard still has security weaknesses that may be exploitable by
arxiv
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar+4 more
wiley +1 more source
Attention on the Preambles: Sensing With mmWave CSI
The ubiquitous availability of wireless networks and devices provides a unique opportunity to leverage the corresponding communication signals to enable wireless sensing applications. In this article, we develop a new framework for environment sensing by
Tatsuya Kikuzuki+3 more
doaj +1 more source
Caterpillar RLNC With Feedback (CRLNC-FB): Reducing Delay in Selective Repeat ARQ Through Coding
Wireless networks typically employ some form of forward error correction (FEC) coding and some automatic repeat request (ARQ) protocol to ensure reliable data transmission over lossy channels.
Frank Gabriel+4 more
doaj +1 more source
Pensieve 5G: Implementation of RL-based ABR Algorithm for UHD 4K/8K Content Delivery on Commercial 5G SA/NR-DC Network [PDF]
While the rollout of the fifth-generation mobile network (5G) is underway across the globe with the intention to deliver 4K/8K UHD videos, Augmented Reality (AR), and Virtual Reality (VR) content to the mass amounts of users, the coverage and throughput are still one of the most significant issues, especially in the rural areas, where only 5G in the ...
arxiv
Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song+13 more
wiley +1 more source
Security of Topology Discovery Service in SDN: Vulnerabilities and Countermeasures
Software-Defined Network (SDN) controller needs comprehensive visibility of the whole network to provide effective routing and forwarding decisions in the data layer.
Sanaz Soltani+3 more
doaj +1 more source
Using 5G in Smart Cities: A Systematic Mapping Study [PDF]
5G is the fifth generation wireless network, with a set of characteristics, e.g., high bandwidth and data rates. The scenarios of using 5G include enhanced Mobile Broadband (eMBB), massive Machine Type Communications (mMTC), and ultra-Reliable and Low-Latency Communications (uRLLC). 5G is expected to support a wide variety of applications. We conducted
arxiv