Results 31 to 40 of about 562,035 (264)

Rapid rise and decay in petition signing

open access: yesEPJ Data Science, 2017
Contemporary collective action, much of which involves social media and other Internet-based platforms, leaves a digital imprint which may be harvested to better understand the dynamics of mobilization. Petition signing is an example of collective action
Taha Yasseri   +2 more
doaj   +1 more source

Reduced vascular leakage correlates with breast carcinoma T regulatory cell infiltration but not with metastatic propensity

open access: yesMolecular Oncology, EarlyView.
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He   +8 more
wiley   +1 more source

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Internet Science

open access: yes, 2011
The structure and behavior of packet switched networks is difficult to model in a way comparable to many natural and artificial systems. Nonetheless, the Internet is an outstanding and challenging case because of its incredibly fast development, unparalleled heterogeneity and the inherent lack of measurement and monitoring mechanisms in its core ...
Montesino Pouzols, Federico   +2 more
openaire   +2 more sources

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Improved Pedestrian Dead Reckoning Based on a Robust Adaptive Kalman Filter for Indoor Inertial Location System

open access: yesSensors, 2019
Pedestrian dead reckoning (PDR) systems based on a microelectromechanical-inertial measurement unit (MEMS-IMU) providing advantages of full autonomy and strong anti-jamming performance are becoming a feasible choice for pedestrian indoor positioning.
Qigao Fan   +8 more
doaj   +1 more source

Internet fraud

open access: yesPravo - teorija i praksa, 2023
Internet law represents one of the youngest branches of law, which emerged from the need to expand the existing and create a new regulatory framework that would regulate the internet and introduce the necessary legal security and protection for its users.
openaire   +2 more sources

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

A texture guided transmission line image enhancement method

open access: yesScientific Reports
With the increasing demand of transmission line inspection, image detection technology plays a crucial role in foreign object detection on transmission lines.
Yu Zhang   +4 more
doaj   +1 more source

Survey of intrusion detection systems: techniques, datasets and challenges

open access: yesCybersecurity, 2019
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and
Ansam Khraisat   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy