Results 71 to 80 of about 1,483,664 (290)

Authentication and Delegation for Operating a Multi-Drone System

open access: yesSensors, 2019
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators.
Mungyu Bae, Hwangnam Kim
doaj   +1 more source

The ACCEPTance of automation: refining circulating tumor cells enumeration for improved metastatic colorectal cancer prognosis

open access: yesMolecular Oncology, EarlyView.
This study highlights the potential of automated enumeration using the ACCEPT software to refine circulating tumor cell (CTC) detection in metastatic colorectal cancer (mCRC). The automated method demonstrates improved accuracy and reduced variability compared to the manual approach.
Michela De Meo   +6 more
wiley   +1 more source

Survey of key management schemes for cluster networks

open access: yes网络与信息安全学报, 2022
With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction ...
Jun LIU, Lin YUAN, Zhishang FENG
doaj  

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

open access: yesSensors, 2015
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj   +1 more source

A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression

open access: yesMolecular Oncology, EarlyView.
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak   +8 more
wiley   +1 more source

Attack Algorithm for a Keystore-Based Secret Key Generation Method

open access: yesEntropy, 2019
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae   +3 more
doaj   +1 more source

Adaptaquin is selectively toxic to glioma stem cells through disruption of iron and cholesterol metabolism

open access: yesMolecular Oncology, EarlyView.
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy