Results 101 to 110 of about 4,412,712 (309)
Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source
This paper presents a novel method for the precise localization of remote radio-signal sources using a formation of unmanned aerial vehicles (UAVs). The approach is based on time-difference-of-arrival (TDoA) measurements and the geometric analysis of ...
Dina Shaltykova +3 more
doaj +1 more source
STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
Anna Romanova, Sergiy Toliupa
doaj +1 more source
The sharing of rights and information in a capability-based protection system [PDF]
The question of sharing of rights and information in the Take-Grant Protection Model is examined by concentrating on the similarities between the two; in order to do this, new theorems are stated and proven for each that specifically show the ...
Bishop, Matt
core +2 more sources
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau +8 more
wiley +1 more source
Integrated assessment of system privacy: Formalisation, normalisation and differential privacy
Requirements for confidentiality and greater data privacy are constantly growing. The aim of this work was to develop a formalised approach to assessing the privacy of information systems based on a vector representation of a set of parameters.
D. Prokopovych-Tkachenko +4 more
doaj +1 more source
Criminal law regulation of cyber fraud crimes-from the perspective of citizens' personal information protection in the era of edge computing. [PDF]
Zhang Y, Dong H.
europepmc +1 more source
Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley +1 more source
OPTIMAL COMPENSATION FOR ENDANGERED SPECIES PROTECTION UNDER ASYMMETRIC INFORMATION [PDF]
This paper argues that policies based on economic instruments are preferable to command and control approaches for effectively protecting biological diversity.
Huennemeyer, Anne-Juliane +2 more
core +1 more source
Dynamics of short pressure probes [PDF]
Report presents practical information for incorporating particle impact protection features and average total pressure measurement into probe design while optimizing probe transient response.
Englund, D. R., Nyland, T. W.
core +1 more source

