Results 61 to 70 of about 118,033 (317)

Detection of Bombyx mori as a Protein Source in Feedingstuffs by Real-Time PCR with a Single-Copy Gene Target

open access: yesAgriculture
The silkworm, Bombyx mori, is reared on a large scale, mainly for silk production. The waste from this silk production, like pupae, is underused. As an edible insect, B. mori is a good source of protein in human food and animal feed.
Aline Marien   +9 more
doaj   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Targeting rapid TKI‐induced AXL upregulation overcomes adaptive ERK reactivation and exerts antileukemic effects in FLT3/ITD acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale   +9 more
wiley   +1 more source

Combined spatially resolved metabolomics and spatial transcriptomics reveal the mechanism of RACK1‐mediated fatty acid synthesis

open access: yesMolecular Oncology, EarlyView.
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu   +3 more
wiley   +1 more source

Research on User Identity Authentication Based on Two-way Confirmation in Data Transmission

open access: yesMATEC Web of Conferences, 2018
User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission.
Li Qin   +3 more
doaj   +1 more source

Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network

open access: yesApplied Sciences, 2020
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices.
Seonghyeon Gong   +3 more
doaj   +1 more source

Kerberos Authentication in Wireless Sensor Networks [PDF]

open access: yesAnn. Univ. Tibiscus Comp. Sci. Series VIII / 1 (2010), 67-80, 2012
We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station.
arxiv  

Integrative systems‐level analysis reveals a contextual crosstalk between hypoxia and global metabolism in human breast tumors

open access: yesMolecular Oncology, EarlyView.
Breast tumor samples scored for metabolic deregulation (M1 to M3) were given a hypoxia score (HS). The highest HS occurred in patients with strongest metabolic deregulation (M3), supporting tumor aggressiveness. HS correlated with the highest number of metabolic pathways in M1. This suggests hypoxia to be an early event in metabolic deregulation.
Raefa Abou Khouzam   +2 more
wiley   +1 more source

The review of Extensible Authentication Protocol and its methods

open access: yesТруды Института системного программирования РАН, 2018
Authentication is associated with a scenario, in which some party (the applicant) presented the identity of the principal and states that this is the principal.
A. V. Nikeshin, V. Z. Shnitman
doaj   +1 more source

Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance

open access: yesMolecular Oncology, EarlyView.
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy