Results 71 to 80 of about 4,412,712 (309)
Tumor mutational burden as a determinant of metastatic dissemination patterns
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal +4 more
wiley +1 more source
Customer perceptions on Internet banking information protection
Background: South Africa has a well-developed and established banking system which compares favourably with those in many developed countries (e.g. USA), but also sets South Africa apart from many other emerging market countries like Egypt and Brazil ...
André Redlinghuis, Chris Rensleigh
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge +17 more
wiley +1 more source
The issue of data protection and data security in the (pre-Lisbon) EU third pillar [PDF]
The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU.
O'Neill, Maria
core +2 more sources
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Distributed Computations Environment Protection Using Artificial Immune Systems
In this article the authors describe possibility of artificial immune systems applying for distributed computations environment protection from definite types of malicious impacts.
A. V. Moiseev +2 more
doaj
An economic analysis of trade-secret protection in buyer-seller relationships [PDF]
The economic analysis of trade-secret protection has traditionally focused on the interests of companies to conceal information from competitors in order to gain a competitive advantage through trade-secret law.
Felix Hoeffler, Stefan Bechtold
core
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Retracted: System Construction of Athlete Health Information Protection Based on Machine Learning Algorithm. [PDF]
International BR.
europepmc +1 more source

