Results 131 to 140 of about 334,436 (368)
Landscape of BRAF transcript variants in human cancer
We investigate the annotation of BRAF variants, focusing on protein‐coding BRAF‐220 (formerly BRAF‐reference) and BRAF‐204 (BRAF‐X1). The IsoWorm pipeline allows us to quantify these variants in human cancer, starting from RNA‐sequencing data. BRAF‐204 is more abundant than BRAF‐220 and impacts patient survival.
Maurizio S. Podda+5 more
wiley +1 more source
Elementary review article on quantum cryptography.
Norbert Lütkenhaus+2 more
openaire +2 more sources
Motion vector‐domain video steganalysis exploiting skipped macroblocks
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li+4 more
doaj +1 more source
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh+8 more
wiley +1 more source
Cryptographic sealing for information secrecy and authentication [PDF]
David K. Gifford
openalex +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
The automatic detection of multimodal fake news has recently garnered significant attention. However, the existing detection methods mainly focus on merging textual and visual features, but fail to make full use of multimodal numbers from the perspective
Facheng Yan+4 more
doaj +1 more source
A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques [PDF]
Ingrid Schaumueller-Bichl, Ernst Piller
openalex +1 more source
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song+11 more
wiley +1 more source
A Generalization of Hellman’s Extension of Shannon’s Approach to Cryptography (Abstract) [PDF]
Pierre Beauchemin, Gilles Brassard
openalex +1 more source