Results 61 to 70 of about 13,332,800 (308)

Plasma extrachromosomal circular DNA as a biomarker in EGFR‐targeted therapy of non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Detection of extrachromosomal circular DNA (eccDNA) in plasma samples from EGFR‐mutated non‐small cell lung cancer patients. Plasma was collected before and during treatment with the EGFR‐tyrosine kinase inhibitor osimertinib. Plasma eccDNA was detected in all cancer samples, and the presence of the EGFR gene on eccDNA serves as a potential biomarker ...
Simone Stensgaard   +5 more
wiley   +1 more source

A simulation model for identifying information security threats from low-frequency acoustoelectric transformations

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2020
Aim. The article considers the physical basis for the formation of a technical channel of information leakage due to low-frequency acoustoelectric transformations. Methods. The research was based on simulation modelling methods.
D. A. Korochentsev   +2 more
doaj   +1 more source

Cytoplasmic p21 promotes stemness of colon cancer cells via activation of the NFκB pathway

open access: yesMolecular Oncology, EarlyView.
Cytoplasmic p21 promotes colorectal cancer stem cell (CSC) features by destabilizing the NFκB–IκB complex, activating NFκB signaling, and upregulating BCL‐xL and COX2. In contrast to nuclear p21, cytoplasmic p21 enhances spheroid formation and stemness transcription factor CD133.
Arnatchai Maiuthed   +10 more
wiley   +1 more source

Research of the information security environment of pharmaceutical organizations in the context of the transformation of pharmaceutical practice

open access: yesAktualʹnì Pitannâ Farmacevtičnoï ì Medičnoï Nauki ta Praktiki
The article presents the results of a study of the information security environment of the pharmaceutical sector (ISEP) amid the transformation of pharmaceutical practice in Ukraine.
N. O. Tkachenko , S. S. Mysiura
doaj   +1 more source

Information protection behaviors: morality and organizational criticality

open access: yesInformation and Computer Security, 2019
Purpose Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions.
Nancy K. Lankton   +2 more
semanticscholar   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Information Protection Service using Topological Image Coverage

open access: yesEUSPN/ICTH, 2019
Information protection services based on the use of elements of the RSA algorithm are quite reliable because the cryptostability of this method is high (RSA keys from 2048 bits and more).
A. Kovalchuk   +3 more
semanticscholar   +1 more source

Detection of circulating tumor DNA in colorectal cancer patients using a methylation‐specific droplet digital PCR multiplex

open access: yesMolecular Oncology, EarlyView.
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto   +8 more
wiley   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS"

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2019
Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process.
O. I. Bokova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy