Results 91 to 100 of about 201,296 (311)
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair+17 more
wiley +1 more source
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes+20 more
wiley +1 more source
GAN-based pseudo random number generation optimized through genetic algorithms
Pseudo-random number generators (PRNGs) are deterministic algorithms that generate sequences of numbers approximating the properties of random numbers, which are widely utilized in various fields.
Xuguang Wu+4 more
doaj +1 more source
Research on Dual-Emotion Feature Fusion and Performance Improvement in Rumor Detection
At present, a large number of rumors are mixed in with various kinds of news, such as current affairs, politics, social economy, and military activities, which seriously reduces the credibility of Internet information and hinders the positive development
Wen Jiang+5 more
doaj +1 more source
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts.
Muhammad Rezal Kamel Ariffin+3 more
doaj +1 more source
Chasing diagrams in cryptography
Cryptography is a theory of secret functions. Category theory is a general theory of functions. Cryptography has reached a stage where its structures often take several pages to define, and its formulas sometimes run from page to page.
Pavlovic, Dusko
core
Elementary review article on quantum cryptography.
Norbert Lütkenhaus+2 more
openaire +2 more sources
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser+11 more
wiley +1 more source
A Secure Authentication Protocol Supporting Efficient Handover for UAV
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen+5 more
doaj +1 more source