Results 121 to 130 of about 16,532 (241)
This study employs longitudinal fluorescence imaging in transgenic mice to map post‐craniotomy cortical recovery. We identify distinct neuroimmune recovery phases: microglial structural inflammation peaks at ∼10 days, neuronal structural intensity peaks at ∼14 days and correlates with microglial activity, and functional network modularity is most ...
Guihua Xiao +13 more
wiley +1 more source
Secure Distributed Federated Learning for Cyberattacks Detection in B5G Open Radio Access Networks
The open radio access network (O-RAN) is designed to support the diverse wireless services for beyond 5th-generation (B5G) mobile networks. However, this also expands the potential attack surface, necessitating improved mechanisms for detecting ...
Fahdah Alalyan +3 more
doaj +1 more source
Identifying disease‐causing genes in neurocognitive disorders remains challenging due to variants of uncertain significance. CLinNET employs dual‐branch neural networks integrating Reactome pathways and Gene Ontology terms to provide pathway‐level interpretability of genomic alterations.
Ivan Bakhshayeshi +5 more
wiley +1 more source
Mutant p53 drives oncogenic splicing to promote the progression of ovarian cancer by partnering with the spliceosome factor SNRPD2. Therefore, it is engineered iRGD‐exosomes to co‐deliver siRNAs against both targets. This approach restored tumor‐suppressive mRNA isoforms, effectively enhanced sensitivity to cisplatin, and ultimately blocked tumor ...
Wei Zhao +14 more
wiley +1 more source
Efficient face information encryption and verification scheme based on full homomorphic encryption
Emerging global privacy mandates enforce strict requirements for biometric data protection, requiring encrypted processing throughout storage and computation phases.
Yijia Chen +7 more
doaj +1 more source
Learned Conformational Space and Pharmacophore Into Molecular Foundational Model
The Ouroboros model introduces two orthogonal modules within a unified framework that independently learn molecular representations and generate chemical structures. This design enables flexible optimization strategies for each module and faithful structure reconstruction without prompts or noise.
Lin Wang +8 more
wiley +1 more source
Quantum secure threshold password authenticated key exchange scheme for VANET
Vehicle ad hoc networks (VANETs) enable efficient communication for enhanced safety and convenience. However, due to their open network environment, VANETs are highly vulnerable to attacks, including eavesdropping and vehicle impersonation.
Alia Umrani, Paolo Palmieri
doaj +1 more source
This study presents a hybrid quantum‐classical framework for accurate prediction of protein structures on utility‐level quantum processors. We evaluate the practical application of the Variational Quantum Eigen‐solver (VQE) in protein structure prediction and demonstrate its superiority over state‐of‐the‐art deep learning methods in molecular docking ...
Yuqi Zhang +10 more
wiley +1 more source
ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song +12 more
wiley +1 more source
The prevailing neglect of cellular hierarchies in current spatial transcriptomics deconvolution often obscures cellular heterogeneity and impedes the identification of fine‐grained subtypes. To address this issue, HIDF employs a cluster‐tree and dual regularization to systematically model cellular hierarchical structures.
Zhiyi Zou +5 more
wiley +1 more source

