Results 51 to 60 of about 5,465,959 (370)

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Network-Layer Accountability Protocols: A Survey

open access: yesIEEE Access, 2018
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj   +1 more source

Effective video multicast over wireless internet [PDF]

open access: yes, 2005
With the rapid growth of wireless networks and great success of Internet video, wireless video services are expected to be widely deployed in the near future. As different types of wireless networks are converging into all IP networks, i.e., the Internet,
Li, B, Lin, C, Ni, Q, Yin, H
core  

Physical Layer Security for the Internet of Things: Authentication and Key Generation

open access: yesIEEE wireless communications, 2019
A low-complexity, yet secure framework is proposed for protecting the IoT and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency ...
Junqing Zhang   +4 more
semanticscholar   +1 more source

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Microfluidic electro‐viscoelastic manipulation of extracellular vesicles

open access: yesFEBS Open Bio, EarlyView.
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh   +7 more
wiley   +1 more source

Optimization of the Marketing Management System Based on Cloud Computing and Big Data

open access: yesComplexity, 2021
With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications.
Lin Zhang
doaj   +1 more source

Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things

open access: yesIEEE Access, 2019
Video surveillance has become ubiquitous due to the increasing security requirements in every sphere of life. The next generation video surveillance system (VSS) possesses great challenges in various applications, such as intelligent urban surveillance ...
Tanin Sultana, K. Wahid
semanticscholar   +1 more source

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things

open access: yesSensors, 2020
Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are
Jingwen Yan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy