Results 121 to 130 of about 177,470 (196)

Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing

open access: yesApplied Sciences
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang   +3 more
doaj   +1 more source

Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers

open access: yesMolecular Oncology, EarlyView.
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel   +6 more
wiley   +1 more source

Quantum Cryptography

open access: yesScientific American, 1992
Bennett, C, Brassard, G, Ekert, A
openaire   +2 more sources

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

FMC: Multimodal fake news detection based on multi-granularity feature fusion and contrastive learning

open access: yesAlexandria Engineering Journal
The automatic detection of multimodal fake news has recently garnered significant attention. However, the existing detection methods mainly focus on merging textual and visual features, but fail to make full use of multimodal numbers from the perspective
Facheng Yan   +4 more
doaj   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Cryptographie

open access: yesCalenda, 2012
La cryptographie peut être définie comme l’art de la communication secrète. Il s’agit le plus souvent, mais pas exclusivement, d’une opération d’écriture, caractérisée par des procédés de dissimulation de nature diverse. Ces procédés sont déployés par le recours à de très nombreuses sources : des textes sacrés aux philosophies de la représentation, des
openaire   +1 more source

Home - About - Disclaimer - Privacy