Results 71 to 80 of about 6,402,619 (361)

EMT‐associated bias in the Parsortix® system observed with pancreatic cancer cell lines

open access: yesMolecular Oncology, EarlyView.
The Parsortix® system was tested for CTC enrichment using pancreatic cancer cell lines with different EMT phenotypes. Spike‐in experiments showed lower recovery of mesenchymal‐like cells. This was confirmed with an EMT‐inducible breast cancer cell line.
Nele Vandenbussche   +8 more
wiley   +1 more source

Development and application of smart key security control system for wind farms

open access: yesDianzi Jishu Yingyong, 2023
The informatization and intelligence of wind farm lock and key management is the key to further improve the level of wind farm operation and maintenance management.
Liu Hailong   +3 more
doaj   +1 more source

Health Care Coverage: Job Lock and the Potential Impact of the Patient Protection and Affordable Care Act [PDF]

open access: yes, 2011
[Excerpt] The majority of Americans—about 55 percent in 2010—rely on employer-sponsored health care coverage, which is largely subsidized by most employers and thus less costly to employees than coverage purchased by individuals on their own.
United States Government Accountability Office
core   +2 more sources

Lock cohorting: A general technique for designing NUMA locks [PDF]

open access: yes, 2012
Multicore machines are quickly shifting to NUMA and CC-NUMA architectures, making scalable NUMA-aware locking algorithms, ones that take into account the machines' non-uniform memory and caching hierarchy, ever more important.
Dice, David   +2 more
core   +2 more sources

Evaluation and modification of tumor cell isolation techniques from malignant effusions for rapid drug sensitivity testing

open access: yesMolecular Oncology, EarlyView.
Non‐small cell lung cancer targeted treatment is limited to a few known genetic alterations, with few alternatives in advanced treatment lines. To direct treatment decisions by drug sensitivity testing (DST), this study compared several methods for tumor cell isolation from malignant effusions, pointing to repeated CD45+ cell depletion for effective ...
Navit Mooshayef   +10 more
wiley   +1 more source

A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips

open access: yesIEEE Transactions on Emerging Topics in Computing, 2019
Scan-based side-channel attacks have become a new threat to cryptographic chips. Existing countermeasures require a secret test key to unlock the scan chain before in-field testing is allowed.
Aijiao Cui   +3 more
semanticscholar   +1 more source

Matrix: a complex amalgam of structures and functions in tumor microenvironment

open access: yesFEBS Open Bio, EarlyView.
The matrix is a dynamic, intricate three‐dimensional mesh of biomolecules with both structural and functional properties. This review deals with the complexity of this ‘molecular amalgam’ in the tumor microenvironment and highlights its importance in the maintenance and evolution of tumors by describing certain matrix biomolecules, such as ...
Spyros S. Skandalis   +3 more
wiley   +1 more source

The Lock-free $k$-LSM Relaxed Priority Queue

open access: yes, 2015
Priority queues are data structures which store keys in an ordered fashion to allow efficient access to the minimal (maximal) key. Priority queues are essential for many applications, e.g., Dijkstra's single-source shortest path algorithm, branch-and ...
Gruber, Jakob   +3 more
core   +2 more sources

BCS1L‐Associated Disease: 5′‐UTR Variant Shifts the Phenotype Towards Axonal Neuropathy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives To investigate the consequences of a pathogenic missense variant (c.838C>T; p.L280F) and a 5′‐UTR regulatory variant (c.‐122G>T) in BCS1L on disease pathogenesis and to understand how regulatory variants influence disease severity and clinical presentation.
Rotem Orbach   +11 more
wiley   +1 more source

IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID

open access: yesJurnal Ilmiah Informatika, 2016
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj   +1 more source

Home - About - Disclaimer - Privacy