Results 51 to 60 of about 3,073,944 (343)

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

FL-GUARD: A Holistic Framework for Run-Time Detection and Recovery of Negative Federated Learning

open access: yesData Science and Engineering
Federated learning (FL) is a promising approach for learning a model from data distributed on massive clients without exposing data privacy. It works effectively in the ideal federation where clients share homogeneous data distribution and learning ...
Hong Lin   +4 more
doaj   +1 more source

EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB [PDF]

open access: yes, 2023
The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%.
Feryzal, Mochammad
core  

Feasibility of a ctDNA multigenic panel for non‐small‐cell lung cancer early detection and disease surveillance

open access: yesMolecular Oncology, EarlyView.
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande   +11 more
wiley   +1 more source

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

Glycosylated LGALS3BP is highly secreted by bladder cancer cells and represents a novel urinary disease biomarker

open access: yesMolecular Oncology, EarlyView.
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece   +18 more
wiley   +1 more source

πFL: Private, atomic, incentive mechanism for federated learning based on blockchain

open access: yesBlockchain: Research and Applications
Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. A plethora of incentive mechanism studies have been conducted with the objective of promoting the provision of ...
Kejia Chen   +4 more
doaj   +1 more source

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Unconditional security at a low cost [PDF]

open access: yes, 2006
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett   +9 more
core   +3 more sources

Home - About - Disclaimer - Privacy