Results 91 to 100 of about 14,204 (271)
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Screening for lung cancer: A systematic review of overdiagnosis and its implications
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz +12 more
wiley +1 more source
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey [PDF]
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers.
Omar Abed Najm, Ahmed Nori
doaj +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
CDK11 inhibition stabilises the tumour suppressor p53 and triggers the production of an alternative p21WAF1 splice variant p21L, through the inactivation of the spliceosomal protein SF3B1. Unlike the canonical p21WAF1 protein, p21L is localised in the cytoplasm and has reduced cell cycle‐blocking activity.
Radovan Krejcir +12 more
wiley +1 more source
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F. +6 more
core
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He +8 more
wiley +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice is to fuse the secret image with the cover image to directly generate the stego image ...
Yuling Zhu +3 more
doaj +1 more source
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source

