Results 61 to 70 of about 118,033 (317)
The silkworm, Bombyx mori, is reared on a large scale, mainly for silk production. The waste from this silk production, like pupae, is underused. As an edible insect, B. mori is a good source of protein in human food and animal feed.
Aline Marien+9 more
doaj +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale+9 more
wiley +1 more source
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu+3 more
wiley +1 more source
Research on User Identity Authentication Based on Two-way Confirmation in Data Transmission
User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission.
Li Qin+3 more
doaj +1 more source
Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices.
Seonghyeon Gong+3 more
doaj +1 more source
Kerberos Authentication in Wireless Sensor Networks [PDF]
We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station.
arxiv
Breast tumor samples scored for metabolic deregulation (M1 to M3) were given a hypoxia score (HS). The highest HS occurred in patients with strongest metabolic deregulation (M3), supporting tumor aggressiveness. HS correlated with the highest number of metabolic pathways in M1. This suggests hypoxia to be an early event in metabolic deregulation.
Raefa Abou Khouzam+2 more
wiley +1 more source
The review of Extensible Authentication Protocol and its methods
Authentication is associated with a scenario, in which some party (the applicant) presented the identity of the principal and states that this is the principal.
A. V. Nikeshin, V. Z. Shnitman
doaj +1 more source
Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang+8 more
wiley +1 more source