Results 61 to 70 of about 2,781,627 (318)
A New Theoretical and Technological System of Imprecise-Information Processing [PDF]
Imprecise-information processing will play an indispensable role in intelligent systems, especially in the anthropomorphic intelligent systems (as intelligent robots). A new theoretical and technological system of imprecise-information processing has been founded in Principles of Imprecise-Information Processing: A New Theoretical and Technological ...
arxiv
Impact of Information and Communication Technology on Individual Well-being [PDF]
This paper investigates the impact of information and communication technology (ICT) adoption on individual well-being.
arxiv
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source
Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi+3 more
wiley +1 more source
Zhengwu LuClinical Research Department, Abbott Vascular, Santa Clara, CA, USAAbstract: Risk assessment during clinical product development needs to be conducted in a thorough and rigorous manner.
Zhengwu Lu
doaj
Reflections on the implications of technology-mediated learning: A teacher educator perspective
In this paper, I report on how my practice was influenced by re-designing an existing introductory teacher education course that included an online component.
Sal J Badali
doaj +1 more source
An authorship protection technology for electronic documents based on image watermarking [PDF]
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems.
arxiv
Information Assurance is the prime name for the security and privacy related affairs. It is responsible for the secure design, development and building of healthy sophisticated information systems. The technologies have become crucial for the development of content and information systems. Information Assurance is a new name in respect of Computing and
Prantosh Paul+3 more
openaire +3 more sources
In this explorative biomarker analysis, we assessed serial sampling of circulating tumor cells (CTCs) with CellSearch in two randomized trials testing immune checkpoint inhibitors (ICIs) in metastatic breast cancer. Our data demonstrate a prognostic potential of CTCs, most apparent 4 weeks into ICI therapy.
Nikolai Kragøe Andresen+13 more
wiley +1 more source
A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini+11 more
wiley +1 more source