Results 91 to 100 of about 235,449 (333)

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools [PDF]

open access: yes
The correct adoption of cryptography APIs is challenging for mainstream developers, often resulting in widespread API misuse. Meanwhile, cryptography misuse detectors have demonstrated inconsistent performance and remain largely inaccessible to most developers. We investigated the extent to which ChatGPT can detect cryptography misuses and compared its
arxiv   +1 more source

Circulating tumor cells: advancing personalized therapy in small cell lung cancer patients

open access: yesMolecular Oncology, EarlyView.
Small cell lung cancer (SCLC) is an aggressive form of lung cancer that spreads rapidly to secondary sites such as the brain and liver. Cancer cells circulating in the blood, “circulating tumor cells” (CTCs), have demonstrated prognostic value in SCLC, and evaluating biomarkers on CTCs could guide treatment decisions such as for PARP inhibitors ...
Prajwol Shrestha   +6 more
wiley   +1 more source

Low-Latency Hardware Masking with Application to AES

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
During the past two decades there has been a great deal of research published on masked hardware implementations of AES and other cryptographic primitives.
Pascal Sasdrich   +3 more
doaj   +1 more source

A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer

open access: yesMolecular Oncology, EarlyView.
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini   +11 more
wiley   +1 more source

GAN-based pseudo random number generation optimized through genetic algorithms

open access: yesComplex & Intelligent Systems
Pseudo-random number generators (PRNGs) are deterministic algorithms that generate sequences of numbers approximating the properties of random numbers, which are widely utilized in various fields.
Xuguang Wu   +4 more
doaj   +1 more source

Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors

open access: yesMolecular Oncology, EarlyView.
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi   +6 more
wiley   +1 more source

Chasing diagrams in cryptography

open access: yes, 2016
Cryptography is a theory of secret functions. Category theory is a general theory of functions. Cryptography has reached a stage where its structures often take several pages to define, and its formulas sometimes run from page to page.
Pavlovic, Dusko
core  

Research on Dual-Emotion Feature Fusion and Performance Improvement in Rumor Detection

open access: yesApplied Sciences
At present, a large number of rumors are mixed in with various kinds of news, such as current affairs, politics, social economy, and military activities, which seriously reduces the credibility of Internet information and hinders the positive development
Wen Jiang   +5 more
doaj   +1 more source

The dangerous path towards your own cryptography method [PDF]

open access: yesarXiv, 2018
Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks.
arxiv  

Home - About - Disclaimer - Privacy