Results 71 to 80 of about 3,766,161 (380)
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh+8 more
wiley +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA).
O. W. Salami, I. J. Umoh, E. A. Adedokun
doaj +1 more source
The integration of wireless sensor networks within the Internet has been possible with the use of the IPv6 over low-power wireless personal area network standard at lower layers and Web services at higher layers.
Patricia E Figueroa+2 more
doaj +1 more source
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik+4 more
wiley +1 more source
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as
Seung-Man Chun, Jong-Tae Park
doaj +1 more source
Lightweight and secure D2D group communication for wireless IoT
In recent years, wirless Internet of Things (IoT) technology has developed rapidly, and the reuse of spectrum resources, network efficiency, and the diversity of multi-communication scenarios have brought great challenges to the existing Internet of ...
Junfeng Miao+5 more
doaj +1 more source
MagicPairing: Apple's Take on Securing Bluetooth Peripherals
Device pairing in large Internet of Things (IoT) deployments is a challenge for device manufacturers and users. Bluetooth offers a comparably smooth trust on first use pairing experience. Bluetooth, though, is well-known for security flaws in the pairing
Antonioli Daniele+4 more
core +1 more source
We evaluated circulating tumor DNA (ctDNA) detection in advanced pancreatic cancer using DNA methylation, cell‐free DNA fragment lengths, and 5′ end motifs. Machine learning models were trained to estimate ctDNA levels from each feature and their combination.
Morten Lapin+10 more
wiley +1 more source
Microfluidic electro‐viscoelastic manipulation of extracellular vesicles
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh+7 more
wiley +1 more source