Results 51 to 60 of about 500,755 (330)

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Ephemeral Node Identifiers for Enhanced Flow Privacy

open access: yesFuture Internet
The Internet Protocol (IP) uses numerical address values carried in IP packets at the network layer to allow correct forwarding of packets between source and destination. Those address values must be kept visible in all parts of the network.
Gregor Tamati Haywood   +1 more
doaj   +1 more source

Lipopolysaccharide uptake is augmented in lipopolysaccharide‐tolerant mouse macrophage‐like cells via increased CD14 expression

open access: yesFEBS Open Bio, EarlyView.
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara   +3 more
wiley   +1 more source

Realistic, Extensible DNS and mDNS Models for INET/OMNeT++ [PDF]

open access: yes, 2015
The domain name system (DNS) is one of the core services in today's network structures. In local and ad-hoc networks DNS is often enhanced or replaced by mDNS. As of yet, no simulation models for DNS and mDNS have been developed for INET/OMNeT++.
Kaiser, Daniel   +2 more
core  

Privacy enhancing primitives [PDF]

open access: yes, 2023
Nowadays, cryptography is ubiquitous in people’s daily interactions. Secure messaging apps implement end-to-end encrypted communication channels between individuals, web browsers encrypt their client-to-server communication, physical access control systems use hardware security devices, and many more.
openaire   +1 more source

Enhancing Speech Privacy with Slicing

open access: yesInterspeech 2022, 2022
Privacy preservation calls for speech anonymization methods which hide the speaker's identity while minimizing the impact on downstream tasks such as automatic speech recognition (ASR) training or decoding. In the recent VoicePrivacy 2020 Challenge, several anonymization methods have been proposed to transform speech utterances in a way that preserves ...
Maouche, Mohamed   +5 more
openaire   +3 more sources

Risk Prediction Models for Recurrence After Curative Treatment of Early‐Stage or Locally Advanced Lung Cancer: A Systematic Review

open access: yesAging and Cancer, EarlyView.
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel   +4 more
wiley   +1 more source

Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Emerging IoT (Internet of Things) technologies provide many benefits to the improvement of healthcare service. The successful deployment of IoT depends on ensuring security and privacy that need to adapt to their processing capabilities.
Seungsoo Baek   +2 more
doaj   +1 more source

Address Privacy of Bluetooth Low Energy

open access: yesMathematics, 2022
Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking the addresses of the LE device. The resolvable private address (
Dazhi Sun, Yangguang Tian
doaj   +1 more source

Home - About - Disclaimer - Privacy