Results 71 to 80 of about 8,091,241 (406)
Internet of Behaviors: A Survey [PDF]
The Internet of Behavior is a research theme that aims to analyze human behavior data on the Internet from the perspective of behavioral psychology, obtain insights about human behavior, and better understand the intention behind the behavior. In this way, the Internet of Behavior can predict human behavioral trends in the future and even change human ...
arxiv
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source
Is there such a thing as free government data?
The recently-amended European Public Sector Information (PSI) Directive rests on the assumption that government data is a valuable input for the knowledge economy.
Federico Morando+2 more
doaj +1 more source
Blockchain for Internet of Things: A Survey [PDF]
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges, such as decentralization, poor interoperability, privacy, and ...
Hongning Dai, Zibin Zheng, Yan Zhang
semanticscholar +1 more source
Contagion on the Internet [PDF]
To the Editor: Computer viruses are designed to be pests, proliferating in uncontrolled ways and causing severe damage to electronic data. These malignant programs, which amplify between files and computers, are strikingly similar in virulence, modes of spread, and evolutionary pathways over time to the microbes that cause infectious diseases.
Trudy M. Wassenaar, Martin J. Blaser
openaire +4 more sources
SLC7A11 frequently migrates faster in SDS‐PAGE. The present study found that the high hydrophobicity of SLC7A11 causes its anomalous migration in SDS‐PAGE with a low concentration of acrylamide gel. Replacing isoleucine with asparagine reduced hydrophobicity and restored its normal migration at 55 kDa, revealing the role of hydrophobicity and gel ...
Nsengiyumva Emmanuel+13 more
wiley +1 more source
What is the next innovation after the internet of things? [PDF]
The world had witnessed several generations of the Internet. Starting with the Fixed Internet, then the Mobile Internet, scientists now focus on many types of research related to the "Thing" Internet (or Internet of Things). The question is "what is the next Internet generation after the Thing Internet?" This paper envisions about the Tactile Internet ...
arxiv
The A3 adenosine receptors (A3ARs) are overexpressed in prostate cancer. AR 292 and AR 357, as A3AR antagonists, are capable of blocking proliferation, modulating the expression of drug transporter genes involved in chemoresistance, ferroptosis, and the hypoxia response, and inducing cell death.
Maria Beatrice Morelli+15 more
wiley +1 more source
A texture guided transmission line image enhancement method
With the increasing demand of transmission line inspection, image detection technology plays a crucial role in foreign object detection on transmission lines.
Yu Zhang+4 more
doaj +1 more source