Results 101 to 110 of about 355,842 (292)

Research on User Identity Authentication Based on Two-way Confirmation in Data Transmission

open access: yesMATEC Web of Conferences, 2018
User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission.
Li Qin   +3 more
doaj   +1 more source

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities [PDF]

open access: yes, 2017
Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse
Abidin, Aysajan   +6 more
core   +1 more source

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

Types of the Fiber Glass-Mat on Fatigue Characteristic of Composite Materials at Constant Fiber Volume Fraction: Experimental Determination

open access: yesAl-Khawarizmi Engineering Journal, 2012
The aim of this work is to study the influence of the type of fiber glass –mat on fatigue behavior of composite material which is manufactured from polyester and E-glass (woven roving, chopped strand mat (CSM)) as a laminate with a constant fiber volume ...
Hussain J. Al-Alkawi   +2 more
doaj  

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Reactive Adsorption Desulfurization by Nanocrystalline ZnO/Zeolite A Molecular Sieves

open access: yesJournal of Engineering, 2017
Nanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step.
Nada Sadoon Ahmedzeki, Prof. Dr.   +3 more
doaj  

Phenotypic and genotypic characterization of single circulating tumor cells in the follow‐up of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon   +9 more
wiley   +1 more source

Combining antibody conjugates with cytotoxic and immune‐stimulating payloads maximizes anti‐cancer activity

open access: yesMolecular Oncology, EarlyView.
Methods to improve antibody–drug conjugate (ADC) treatment durability in cancer therapy are needed. We utilized ADCs and immune‐stimulating antibody conjugates (ISACs), which are made from two non‐competitive antibodies, to enhance the entry of toxic payloads into cancer cells and deliver immunostimulatory agents into immune cells.
Tiexin Wang   +3 more
wiley   +1 more source

Regression-based context aware authentication scheme for IoT devices: cognitive agents approach

open access: yesJournal of Information and Telecommunication
The proposed research focuses on providing strong IoT device authentication using the Belief–Desire–Intention (BDI) framework in conjunction with the Random Forest (RF) algorithm.
Poornima M. Chanal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy