Results 201 to 210 of about 15,333 (299)
A deeper understanding of the natural killer cell gene expression regulation driving NK cell maturation and cytotoxicity could provide critical insights into optimizing NK therapies. Our findings reveal novel enhancers governing NK cell genes for NCAM1/CD56 and cis‐regulation for KIR receptors and clarify existing models of NK cell cis‐accessibility ...
Mariam A. Salem +9 more
wiley +1 more source
Multi-factor authentication and key agreement scheme based on PUF and Chebyshev chaotic map for wireless sensor networks. [PDF]
Wang L, Han C.
europepmc +1 more source
Science that speaks: The public face of physiology
Experimental Physiology, EarlyView.
Danny W. Walmsley +4 more
wiley +1 more source
Abstract Purpose The purpose of this study was to compare the accuracy, calibration, reproducibility and operating cost of seven large language models (LLMs)—including four newer models capable of using advanced reasoning techniques to analyse complex medical information and generate accurate responses—on text‐only orthopaedic multiple‐choice questions
Pedro Diniz +5 more
wiley +1 more source
Accelerated Feature Selection via Discernibility Hashing: A Rough Set Approach. [PDF]
Luo S, Shi L, Chen L, Cao X.
europepmc +1 more source
Abstract Salt's inherent weakness and capacity for ductile deformation create significant mechanical contrasts that locally perturb the stress field in surrounding rocks, often leading to deviations from regional tectonic stresses. Variations in local stress are a critical factor for wellbore stability, seal integrity, and fluid flow in subsurface ...
Lauren J. Reeher +3 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Summary Introduction Demand for surgical treatment is growing and patient complexity is increasing. The NHS England standard contract now requires that pre‐operative services risk stratify and optimise patients awaiting surgery. However, current pre‐operative workflows (whether electronic or paper‐based) remain based primarily on resource‐intensive ...
Alwyn Kotzé +7 more
wiley +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source

