Results 51 to 60 of about 500,755 (330)
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Ephemeral Node Identifiers for Enhanced Flow Privacy
The Internet Protocol (IP) uses numerical address values carried in IP packets at the network layer to allow correct forwarding of packets between source and destination. Those address values must be kept visible in all parts of the network.
Gregor Tamati Haywood +1 more
doaj +1 more source
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara +3 more
wiley +1 more source
Realistic, Extensible DNS and mDNS Models for INET/OMNeT++ [PDF]
The domain name system (DNS) is one of the core services in today's network structures. In local and ad-hoc networks DNS is often enhanced or replaced by mDNS. As of yet, no simulation models for DNS and mDNS have been developed for INET/OMNeT++.
Kaiser, Daniel +2 more
core
Privacy enhancing primitives [PDF]
Nowadays, cryptography is ubiquitous in people’s daily interactions. Secure messaging apps implement end-to-end encrypted communication channels between individuals, web browsers encrypt their client-to-server communication, physical access control systems use hardware security devices, and many more.
openaire +1 more source
Enhancing Speech Privacy with Slicing
Privacy preservation calls for speech anonymization methods which hide the speaker's identity while minimizing the impact on downstream tasks such as automatic speech recognition (ASR) training or decoding. In the recent VoicePrivacy 2020 Challenge, several anonymization methods have been proposed to transform speech utterances in a way that preserves ...
Maouche, Mohamed +5 more
openaire +3 more sources
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel +4 more
wiley +1 more source
Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment
Emerging IoT (Internet of Things) technologies provide many benefits to the improvement of healthcare service. The successful deployment of IoT depends on ensuring security and privacy that need to adapt to their processing capabilities.
Seungsoo Baek +2 more
doaj +1 more source
Address Privacy of Bluetooth Low Energy
Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking the addresses of the LE device. The resolvable private address (
Dazhi Sun, Yangguang Tian
doaj +1 more source

