Results 181 to 190 of about 700,206 (362)
Non‐small cell lung cancer targeted treatment is limited to a few known genetic alterations, with few alternatives in advanced treatment lines. To direct treatment decisions by drug sensitivity testing (DST), this study compared several methods for tumor cell isolation from malignant effusions, pointing to repeated CD45+ cell depletion for effective ...
Navit Mooshayef+10 more
wiley +1 more source
A new method of determining the change in position of teeth in orthodontic treatment
Anomalies position of individual teeth are quite common pathology dentition. This is a problem as during the orthodontic treatment of anomalies and deformations dental system in the preparation of oral prosthetics.
E. Y. Nikolaeva+2 more
doaj
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková+14 more
wiley +1 more source
Construction of VAE-GRU-XGBoost intrusion detection model for network security. [PDF]
Chen Y, Zheng X, Wang N.
europepmc +1 more source
In prostate carcinoma, lactic acid, secreted by highly glycolytic cancer‐associated fibroblasts, is imported into tumor cells through the MCT1 transporter and prevents RSL3 and erastin‐induced ferroptosis (A). Targeting of carbonic anhydrase IX/XII, the main extracellular pH regulators, in tumor and stromal cells reduces microenvironmental acidosis and
Elisa Pardella+18 more
wiley +1 more source
The geochemistry of the northern part of the Ilímaussaq intrusion, S.W. Greenland
E.I. Hamilton
openalex +2 more sources
This study presents a novel AI‐based diagnostic approach—comprehensive serum glycopeptide spectra analysis (CSGSA)—that integrates tumor markers and enriched glycopeptides from serum. Using a neural network model, this method accurately distinguishes liver and pancreatic cancers from healthy individuals.
Motoyuki Kohjima+6 more
wiley +1 more source
A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment. [PDF]
Oliullah K+4 more
europepmc +1 more source