Results 111 to 120 of about 1,206,493 (389)

Integrative miRNOMe profiling reveals the miR‐195‐5p–CHEK1 axis and its impact on luminal breast cancer outcomes

open access: yesMolecular Oncology, EarlyView.
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková   +14 more
wiley   +1 more source

Development and Application of Ultra High Strength Cable forDeep Ten Thousand Meter Wells

open access: yesCejing jishu
In response to the challenges of high tension and ultra long signal transmission faced by cable logging in deep 10 000-meter wells, this article adopts a combination of theoretical design, data analysis, and experimental testing.
MA Jianghu   +8 more
doaj   +1 more source

Association of high‐dose radioactive iodine therapy with PPM1D‐mutated clonal hematopoiesis in older individuals

open access: yesMolecular Oncology, EarlyView.
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim   +11 more
wiley   +1 more source

Ultrasonic Flowrate Measurement System for Underground Two-Phase Rate Based on CTMU

open access: yesCejing jishu
The method of flow measurement based on ultrasonic time difference is widely used in the field of downhole fluid velocity measurement and analysis. With the advantages of non-contact, easy installation, and no change in fluid motion state, it can measure
CHEN Qiang   +6 more
doaj   +1 more source

Fine-Grain Checkpointing with In-Cache-Line Logging

open access: yes, 2019
Non-Volatile Memory offers the possibility of implementing high-performance, durable data structures. However, achieving performance comparable to well-designed data structures in non-persistent (transient) memory is difficult, primarily because of the ...
Aksun, David T.   +3 more
core   +1 more source

The American put is log-concave in the log-price

open access: yesJournal of Mathematical Analysis and Applications, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Erik Ekström, Johan Tysk
openaire   +2 more sources

ITGAV and SMAD4 influence the progression and clinical outcome of pancreatic ductal adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
In SMAD4‐positive pancreatic ductal adenocarcinoma (PDAC), integrin subunit alpha V (ITGAV) activates latent TGF‐β, which binds to the TGF‐β receptor and phosphorylates SMAD2/3. The activated SMAD2/3 forms a complex with SMAD4, and together they translocate to the nucleus, modulating gene expression to promote proliferation, migration, and invasion. In
Daniel K. C. Lee   +9 more
wiley   +1 more source

Inversion Method of Logging Data by Array Temperature Difference Flow Tool for Horizontal Wells in Tight Oil Reservoirs

open access: yesCejing jishu
Due to the extremely poor physical properties of tight reservoirs, the yield of single well is generally low. Accurately monitoring and evaluating the dynamics of oil-water phase flow in horizontal wells, and obtaining the oil and water production of ...
CHEN Qiang   +5 more
doaj   +1 more source

The main challenges of sustainable forest management in the Amazon: why sustainable forest management in the Amazon should be reinforced? [PDF]

open access: yes, 2019
Since the last 50 years, tropical natural forests have been intensively logged in the tropics to supply the increasing demand of tropical timber. Unplanned logging operations caused forest degradation leading to their conversion due to the loss of their ...
De Oliveira, Marcus Vinicius   +10 more
core  

NoSEBrEaK - Attacking Honeynets

open access: yes, 2004
It is usually assumed that Honeynets are hard to detect and that attempts to detect or disable them can be unconditionally monitored. We scrutinize this assumption and demonstrate a method how a host in a honeynet can be completely controlled by an ...
Dornseif, Maximillian   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy