Results 41 to 50 of about 567,688 (336)
Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Optimization of the Marketing Management System Based on Cloud Computing and Big Data
With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications.
Lin Zhang
doaj +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things
Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are
Jingwen Yan +5 more
doaj +1 more source
Quality of Service over Specific Link Layers: state of the art report [PDF]
The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service.
Ait Yaiz, Rachid +2 more
core +2 more sources
An Internet Protocol adaptation layer for underwater acoustic networks
The Internet of Underwater Things (IoUT) is on the way. The key application areas of IoUT include ocean engineering, maritime security and environmental monitoring. To achieve interoperability between different underwater communicating systems and/or to ensure connectivity from the air to underwater (and reversely), an Internet Protocol (IP) adaptation
Parrein, Benoît +2 more
openaire +2 more sources
Microfluidic electro‐viscoelastic manipulation of extracellular vesicles
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh +7 more
wiley +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source

