Results 191 to 200 of about 168,960 (287)
Kun-peng enables scalable and accurate pan-domain metagenomic classification. [PDF]
Chen Q +6 more
europepmc +1 more source
Bottom‐Up Programming of Cell States in Cancer Organoids with Defined Synthetic Adhesion Cues
A bottom‐up biomaterial platform is developed to program transcriptomic states in pancreatic cancer organoids by tuning adhesion cues within synthetic matrices. By combining a Design of Experiments framework with multiobjective optimization, matrix compositions are identified that enrich specific cellular programs like EMT.
Ali Nadernezhad +6 more
wiley +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security. [PDF]
Wang Q +5 more
europepmc +1 more source
The end stage of barrier estuary infill: Insights from Jack Smith Lake, Southeastern Australia
Infill model for the saline coastal lake estuary, Jack Smith Lake. Abstract Jack Smith Lake in southeastern Australia is an infilled saline coastal lake, disconnected from the ocean by a foredune barrier. This study explores the Holocene infill history of this estuary in order to understand the end‐stage evolution of barrier estuarine systems with ...
David M. Kennedy +6 more
wiley +1 more source
A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks. [PDF]
Fan Q, Wang Y, Li X.
europepmc +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
ABSTRACT Extracellular vesicles (EVs), including exosomes, circulate in body fluids and carry pathological genomic information. High‐grade serous ovarian carcinoma (HGSOC) is the most common subtype of ovarian cancer, characterized predominantly by copy number variations (CNVs).
Ryosuke Uekusa +17 more
wiley +1 more source
A Lightweight Privacy-Enhanced Federated Clustering Algorithm for Edge Computing. [PDF]
Wang J +5 more
europepmc +1 more source

