Results 41 to 50 of about 815,217 (293)

Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree

open access: yesMathematics, 2022
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li   +6 more
doaj   +1 more source

Response to neoadjuvant chemotherapy in early breast cancers is associated with epithelial–mesenchymal transition and tumor‐infiltrating lymphocytes

open access: yesMolecular Oncology, EarlyView.
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane   +16 more
wiley   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer

open access: yesCybersecurity
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang   +4 more
doaj   +1 more source

Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks

open access: yesEURASIP Journal on Information Security, 2020
Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup (P&XE) scheme is proposed.
Junfeng Tian, Zilong Wang, Zhen Li
doaj   +1 more source

METTL3 knockout accelerates hepatocarcinogenesis via inhibiting endoplasmic reticulum stress response

open access: yesFEBS Open Bio, EarlyView.
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui   +15 more
wiley   +1 more source

Boundaries of photosynthesis: adaptations of carbon fixation in extreme environments

open access: yesFEBS Open Bio, EarlyView.
Photosynthesis faces challenges from environmental extremes of temperature, pH, and salinity, limiting gas diffusion, modifying membrane fluidity, and destabilizing photochemical and biochemical reactions. Photosynthetic organisms have evolved unique adaptations overcoming these stresses and maintaining their photosynthetic activity.
Pere Aguiló‐Nicolau   +3 more
wiley   +1 more source

Les chercheurs face à la surveillance d’État : état des lieux et contre-mesures

open access: yesTracés, 2019
Since the 2013 disclosures of whistleblower Edward Snowden on the surveillance practices of Western intelligence agencies, the exposure of the field of social science to state surveillance – implemented by judiciary and police authorities, and more ...
Félix Tréguer, Camille Noûs
doaj   +1 more source

Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies

open access: yesFEBS Open Bio, EarlyView.
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa   +13 more
wiley   +1 more source

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]

open access: yessubmission of CCS 2020, 2020
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv  

Home - About - Disclaimer - Privacy