Results 61 to 70 of about 11,028,780 (364)
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
Hiding Contextual Information for Defending a Global Attacker
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj +1 more source
Unilateral Invasions of Privacy [PDF]
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used.
Ford, Roger Allan
core +2 more sources
Privacy Implications of In-Network Aggregation Mechanisms for VANETs [PDF]
Research on vehicular ad hoc networks (VANETs) is active and ongoing. Proposed applications range from safety applications, and traffic efficiency applications to entertainment applications. Common to many applications is the need to disseminate possibly
Dietzel, Stefan
core +4 more sources
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu+11 more
wiley +1 more source
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems
Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same ...
Javier Parra-Arnau+2 more
doaj +1 more source
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan+3 more
doaj +1 more source
This nationwide study evaluated KRAS and NRAS mutations in 10 754 Turkish patients with metastatic colorectal cancer. The results revealed a mutation frequency of 51.1%, with 46.6% having KRAS mutations, 4.5% having NRAS mutations, and 48.5% being wild‐type for both.
Gozde Kavgaci+6 more
wiley +1 more source
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station.
Tai-Hoon Kim+2 more
doaj +1 more source
Global Education Industry - Exploring the state of affairs in Austria
Digitization initiatives in the field of education always correspond with developments in the education industry. In recent years, globally networked development dynamics have emerged that are essentially characterized by an education-industrial complex ...
English English, Reinhold Madritsch
doaj +1 more source