Results 101 to 110 of about 367,191 (281)
This study presents a vascularized 3D tumor model to investigate immune–stromal–tumor interactions under allogeneic PBMC perfusion. While immune cells induced tumor shrinkage, they also promoted vascular regression, stromal activation, and cancer cell invasion.
Alexandra Raab +8 more
wiley +1 more source
In pancreatic ductal adenocarcinoma (PDAC), insulin is associated with activation of PI3K/AKT–RAB3A signaling and enhanced secretion of TNFAIP8‐enriched exosomes from tumor cells. Uptake of these exosomes by fibroblasts is linked to TRIM21‐dependent STAT1 degradation and the emergence of myofibroblastic CAF–associated features, accompanied by increased
Zhenyu Li +15 more
wiley +1 more source
Without need for the third party and sharing key, the dummy-based privacy protection scheme enabled users to obtain the precise query result in location-based services.
Hai LIU +3 more
doaj +2 more sources
Robot location privacy protection based on Q-learning particle swarm optimization algorithm in mobile crowdsensing. [PDF]
Ma D, Kong D, Chen X, Zhang L, Yuan M.
europepmc +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
LOCATION SHARING: PRIVACY THREATS AND PROTECTION
In recent years there has been a growing increase in the number of users that use smartphones,tablets, wearable technologies and other devices that users have with them constantly. The capability of these latest generation mobile devices to detect the position of the users has led to the emergence of ad-hoc services as well as geo-aware social networks
openaire +2 more sources
Climate change reshapes the spatial alignment between crop production and environmental resources. Using multi‐source data and a crop model, integrated climatic, water, and soil endowments for maize and wheat are quantified and compared with harvest distributions.
Zheng'e Su +13 more
wiley +1 more source
Implanting Life-Cycle Privacy Policies in a Context Database [PDF]
Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction.
Anciaux, Nicolas +3 more
core +2 more sources
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that preces the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl +27 more
wiley +1 more source

