Results 131 to 140 of about 2,661,670 (316)
Proteomic and phosphoproteomic analyses were performed on lung adenocarcinoma (LUAD) tumors with EGFR, KRAS, or EML4–ALK alterations and wild‐type cases. Distinct protein expression and phosphorylation patterns were identified, especially in EGFR‐mutated tumors. Key altered pathways included vesicle transport and RNA splicing.
Fanni Bugyi +12 more
wiley +1 more source
Network-based malcode detection technology
Following the analysis for traditional distributed IDS,disadvantages that applying structure of multiple engine and small rules set to detect network-level malcode were pointed out,which is based on detailed protocol decoding.Detection model and anti ...
WU Bing1, YUN Xiao-chun2, GAO Qi1
doaj
The main objective of this article is to provide recommendations for improving the quality of service indicators in priority service corporate computer networks, including the probability of denial of service attacks, the probability of timely and ...
Zakir Nasib Huseynov
doaj +1 more source
A mini-computer network for support of real time research [PDF]
W.J. Lennon
openalex +1 more source
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
RKIP, a metastasis suppressor protein, modulates key oncogenic pathways in lung adenocarcinoma. In silico analyses linked low RKIP expression to poor survival. Functional studies revealed RKIP overexpression reduces tumor aggressiveness and enhances sensitivity to EGFR‐targeted therapies, while its loss promotes resistance.
Ana Raquel‐Cunha +10 more
wiley +1 more source
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
To evaluate the large-scale computer networks,a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed.First,it models the elements which compose the network and the factors which affect the network security ...
JIA Wei1 +3 more
doaj
Some implications of computer networks for psychology [PDF]
Walter A. Sedelow
openalex +1 more source
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik +4 more
wiley +1 more source
Queuing system GI/M/1/N with randomly dropping packets mechanism
For the original GI/M/1/N queuing system was not suitable to model the queue management mechanism,a queuing system GI/M/1/N with randomly dropping packets mechanism was discussed by means of thinning of recurrent flows.In addition,the packet loss rate ...
WANG Hao1, LI Xiao-ming1
doaj

