Results 71 to 80 of about 1,267,704 (337)

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

Computer Communication Network Fault Detection Based on Improved Neural Network Algorithm

open access: yesElectrica, 2022
Dong Sun   +3 more
doaj   +1 more source

Graph Theory and Optimization Problems for Very Large Networks [PDF]

open access: yesarXiv, 2009
Graph theory provides a primary tool for analyzing and designing computer communication networks. In the past few decades, Graph theory has been used to study various types of networks, including the Internet, wide Area Networks, Local Area Networks, and networking protocols such as border Gateway Protocol, Open shortest Path Protocol, and Networking ...
arxiv  

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

Large scale network worm detection using automatic signature extraction

open access: yesTongxin xuebao, 2006
Worms had done serious harm to the computer networks due to their propagating speeds.The research was necessary to detect worms quickly and automatically.In large scale networks,flux based anomaly found module was used to screen out anomalous network ...
WANG Ping, FANG Bin-xing, YUN Xiao-chun
doaj  

Proposal for an ad hoc computer network in the military electronic systems department at the military academy applying bluetooth technology

open access: yesVojnotehnički Glasnik, 2011
The historical development of the Bluetooth module is given in the introduction of this paper. The importance of the Bluetooth standard for wireless connection on small distances is shown as well. The organization of the Department of Military Electronic
Miroslav R. Terzić
doaj   +1 more source

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

Queuing system GI/M/1/N with randomly dropping packets mechanism

open access: yesTongxin xuebao, 2006
For the original GI/M/1/N queuing system was not suitable to model the queue management mechanism,a queuing system GI/M/1/N with randomly dropping packets mechanism was discussed by means of thinning of recurrent flows.In addition,the packet loss rate ...
WANG Hao1, LI Xiao-ming1
doaj  

Dynamic ID-based remote user authentication scheme using ElGamal encryption system

open access: yesNova Scientia, 2016
We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce.
Rafael Martínez Peláez   +3 more
doaj   +1 more source

Modeling network technology deployment rates with different network models [PDF]

open access: yesarXiv, 2011
To understand the factors that encourage the deployment of a new networking technology, we must be able to model how such technology gets deployed. We investigate how network structure influences deployment with a simple deployment model and different network models through computer simulations. The results indicate that a realistic model of networking
arxiv  

Home - About - Disclaimer - Privacy