Results 71 to 80 of about 72,952 (289)
Comprehensive analysis of genomic mutations, gene expression, DNA methylation, and pathway analysis of TCGA data was carried out to define cancer types in which proteasome subunits expression is associated with worse survival. Albeit the effect of specific proteasome subunits on cellular function, the main role of the proteasome is better evaluated ...
Ruba Al‐Abdulla +5 more
wiley +1 more source
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu +12 more
wiley +1 more source
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem +2 more
doaj +1 more source
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh +8 more
wiley +1 more source
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength.
Koblitz Neal, Menezes Alfred
doaj +1 more source
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo +8 more
wiley +1 more source
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many ...
Sayyada Fahmeeda Sultana, D C Shubhangi
doaj +1 more source
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song +11 more
wiley +1 more source
Message authentication codes for the Network Time Protocol [PDF]
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication,
Goldberg, Sharon, Malhotra, Aanchal
core

