Results 121 to 130 of about 16,583 (248)
In the epoch of cloud services, the number of data consumers has increased due to the rise in cloud storage services. This has also led to an increase in the number of data owners who store their encrypted data in the cloud.
K. Vignesh Saravanan, G. Sakthi Priya
doaj +1 more source
ABSTRACT Cancer‐associated fibroblasts (CAFs) are the predominant stromal components within the tumor microenvironment (TME), playing multifaceted roles in cancer progression through dynamic interactions with neoplastic and immune cells. Emerging evidence has revealed remarkable heterogeneity and plasticity of CAFs, which originate from diverse ...
Rujiao Liu +4 more
wiley +1 more source
We introduce AutomataGPT, a generative pretrained transformer (GPT) trained on synthetic spatiotemporal data from 2D cellular automata to learn symbolic rules. Demonstrating strong performance on both forward and inverse tasks, AutomataGPT establishes a scalable, domain‐agnostic framework for interpretable modeling, paving the way for future ...
Jaime A. Berkovich +2 more
wiley +1 more source
ERK‐Mediated Phosphorylation of YAP Defines a Noncanonical FGF Signaling Mechanism in Stem Cells
With a powerful combination of in vivo, ex vivo, and in vitro models, the authors highlight a novel FGF‐ERK signaling regulation of YAP at the S128 site in neural crest‐derived stem cells. This study opens exciting new directions in stem cell biology and craniofacial biology, paving the way for potential innovations in the treatment of craniofacial ...
Xiaolei Zhao +16 more
wiley +1 more source
Efficient face information encryption and verification scheme based on full homomorphic encryption
Emerging global privacy mandates enforce strict requirements for biometric data protection, requiring encrypted processing throughout storage and computation phases.
Yijia Chen +7 more
doaj +1 more source
This study employs longitudinal fluorescence imaging in transgenic mice to map post‐craniotomy cortical recovery. We identify distinct neuroimmune recovery phases: microglial structural inflammation peaks at ∼10 days, neuronal structural intensity peaks at ∼14 days and correlates with microglial activity, and functional network modularity is most ...
Guihua Xiao +13 more
wiley +1 more source
Quantum secure threshold password authenticated key exchange scheme for VANET
Vehicle ad hoc networks (VANETs) enable efficient communication for enhanced safety and convenience. However, due to their open network environment, VANETs are highly vulnerable to attacks, including eavesdropping and vehicle impersonation.
Alia Umrani, Paolo Palmieri
doaj +1 more source
Hierarchical Summary Statistics Encoding Across Primary Visual and Posterior Parietal Cortices
This study shows that mouse V1 simultaneously encodes the ensemble mean and variance of motion, providing a robust summary‐statistic representation that persists despite single‐neuron variability. These signals propagate to PPC, where they are transformed into abstract category representations during decision making.
Young‐Beom Lee +4 more
wiley +1 more source
An integrated approach combining mass spectrometry imaging, transcriptomics, and phylogenetic analysis facilitated the efficient identification of genes involved in gallotannin biosynthesis in Paeonia suffruticosa. As a result, a key UGT and several SCPL acyltransferases responsible for biosynthesizing pentagalloylglucose were successfully identified ...
Yushi Liu +4 more
wiley +1 more source
Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu +4 more
wiley +1 more source

