Results 151 to 160 of about 2,602,398 (316)
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj +1 more source
Single‐cell transcriptomics of prostate cancer patient‐derived xenografts reveals distinct features of neuroendocrine (NE) subtypes. Tumours with focal NE differentiation (NED) share transcriptional programmes with adenocarcinoma, differing from large and small cell neuroendocrine prostate cancer (NEPC). Our work defines the molecular landscape of NEPC,
Rosalia Quezada Urban+12 more
wiley +1 more source
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik+4 more
wiley +1 more source
A Resistance Network Analogue Computer for Analysis of Heat Conduction Ploblems
N. Seki
openalex +2 more sources
Computer networks in higher education [PDF]
Jack A. Chambers, R. V. Poore
openalex +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts+8 more
wiley +1 more source
Comparative Analysis of Computer Network Security Scanners
The paper is devoted to the analysis of the problem of comparison of security scanners computer network. A common comprehensive assessment of security control is developed on the base of comparative analysis of data security controls.
Victor Sergeevich Gorbatov+1 more
doaj
Dynamics of a delayed model for the transmission of malicious objects in computer network. [PDF]
Zhang Z, Yang H.
europepmc +1 more source
Modeling an experimental computer communication network [PDF]
J.F. Hayes
openalex +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira+14 more
wiley +1 more source