Results 91 to 100 of about 201,296 (311)

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

The atypical KRASQ22K mutation directs TGF‐β response towards partial epithelial‐to‐mesenchymal transition in patient‐derived colorectal cancer tumoroids

open access: yesMolecular Oncology, EarlyView.
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair   +17 more
wiley   +1 more source

A large‐scale retrospective study in metastatic breast cancer patients using circulating tumour DNA and machine learning to predict treatment outcome and progression‐free survival

open access: yesMolecular Oncology, EarlyView.
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes   +20 more
wiley   +1 more source

GAN-based pseudo random number generation optimized through genetic algorithms

open access: yesComplex & Intelligent Systems
Pseudo-random number generators (PRNGs) are deterministic algorithms that generate sequences of numbers approximating the properties of random numbers, which are widely utilized in various fields.
Xuguang Wu   +4 more
doaj   +1 more source

Research on Dual-Emotion Feature Fusion and Performance Improvement in Rumor Detection

open access: yesApplied Sciences
At present, a large number of rumors are mixed in with various kinds of news, such as current affairs, politics, social economy, and military activities, which seriously reduces the credibility of Internet information and hinders the positive development
Wen Jiang   +5 more
doaj   +1 more source

New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

open access: yesCryptography, 2018
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts.
Muhammad Rezal Kamel Ariffin   +3 more
doaj   +1 more source

Chasing diagrams in cryptography

open access: yes, 2016
Cryptography is a theory of secret functions. Category theory is a general theory of functions. Cryptography has reached a stage where its structures often take several pages to define, and its formulas sometimes run from page to page.
Pavlovic, Dusko
core  

Quantum cryptography

open access: yes, 2006
Elementary review article on quantum cryptography.
Norbert Lütkenhaus   +2 more
openaire   +2 more sources

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

A Secure Authentication Protocol Supporting Efficient Handover for UAV

open access: yesMathematics
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy