Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Cryptographic key generation using deep learning with biometric face and finger vein data. [PDF]
Gizachew Yirga T +2 more
europepmc +1 more source
LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications. [PDF]
Han B, Peng S, Wu C, Wang X, Wang B.
europepmc +1 more source
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Secure gray image sharing framework with adaptive key generation using image digest. [PDF]
Nithya C +7 more
europepmc +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Biometry-based verification system with symmetric key generation method for internet of things environments. [PDF]
Szymoniak S, Kubanek M.
europepmc +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
An Iterative quantum chaotic security method design for big data deployments using a multi-model framework for key generation, threat modelling, and anomaly-resilient validation. [PDF]
Kotangale A, Kumar MS.
europepmc +1 more source
Optical-Amplifier-Compatible Long-Distance Secure Key Generation Based on Random Phase Fluctuations for WDM Systems. [PDF]
Wu B, Huang YK.
europepmc +1 more source

