Results 71 to 80 of about 87,489 (286)
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns +10 more
wiley +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Multi-authority attribute-based access control system in mHealth with traceability
Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to ...
Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO
doaj +2 more sources
Crediting multi-authored papers to single authors
A fair assignment of credit for multi-authored publications is a long-standing issue in scientometrics. In the calculation of the $h$-index, for instance, all co-authors receive equal credit for a given publication, independent of a given author's contribution to the work or of the total number of co-authors.
Tietze, Anna +2 more
openaire +7 more sources
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li +4 more
doaj +1 more source
Financial Supervision Fragmentation and Central Bank Independence: The Two Sides of the Same Coin? [PDF]
This paper analyses how the central banks role in the monetary institutional setting can affect the unification process of the overall financial supervision architecture.
Andreas Freytag, Donato Masciandaro
core
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
Institutions Matter: Financial Supervision Architecture, Central Bank and Path Dependence. General Trends and the South Eastern European Countries [PDF]
We propose a path dependence approach to analyze the evolution of the financial supervisory architecture, focusing on the institutional role of the central bank, and then apply our framework to describe the institutional settings in a selected sample of ...
Donato Masciandaro, Marc Quintyn
core
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov +9 more
core +1 more source

