Results 101 to 110 of about 8,674 (276)

Heterozygous loss‐of‐function alleles associate the conserved 3′‐5′ exoribonuclease EXOSC10 with hypersensitivity to the anticancer drug 5‐fluorouracil

open access: yesMolecular Oncology, EarlyView.
EXOSC10, an essential nuclear RNA exosome‐associated 3′‐5′ exoribonuclease, is inhibited by the anticancer drug 5‐fluorouracil (5‐FU), and EXOSC10 depletion increases 5‐FU sensitivity. The colon‐cancer variant EXOSC10S402T, located in a proteolysis motif, is stable and nuclear but nonfunctional in vivo.
Radhika Sain   +10 more
wiley   +1 more source

NKCC1: A key regulator of glioblastoma progression

open access: yesMolecular Oncology, EarlyView.
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen   +5 more
wiley   +1 more source

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

Reversible Image Steganography Scheme Based on a U-Net Structure

open access: yesIEEE Access, 2019
Traditional steganography methods often hide secret data by establishing a mapping relationship between secret data and a cover image or directly in a noisy area, but has a low embedding capacity.
Xintao Duan   +5 more
doaj   +1 more source

USP29‐regulated noncanonical stabilization of the hypoxia‐inducible factor‐α in aggressive prostate cancer

open access: yesMolecular Oncology, EarlyView.
We identify USP29 as the only DUB mirroring CA9 expression, a marker of hypoxia and HIF pathway activation associated with PCA aggressiveness. USP29 stabilizes HIF‐1α and HIF‐2α via a noncanonical mechanism that is independent of PHD/pVHL activity yet relies on proteasomal regulation, establishing USP29 as a previously unrecognized regulator of hypoxic
Amelie S Schober   +16 more
wiley   +1 more source

A New Key Delivery Method in Wireless Network

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
The development of networking technologies and the increase of digital devices have made multimedia transmission quick and easy. However, digital data transmission over open communication channels has introduced a number of security implications, such as
Çağatay Ay
doaj  

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

ISEM:image steganography enhancement model based on generative multi-adversarial network

open access: yes网络与信息安全学报
Image steganography techniques were typically categorized into symmetric and asymmetric types based on whether the embedding costs of +1 and -1 within the same embedding unit were equal.
ZHOU Saixing, YE Miaoxin, LUO Weiqi
doaj  

Steganography Defense Network Based on Simulation of Steganography Information Distribution

open access: yesInternational Journal of Intelligent Systems
In order to block the spread of illegal stego‐image and reduce the erasing traces of steganography attacks on images, this paper proposes a steganography attack network based on simulation of steganography information distribution. First, a strategy of simulating steganography noise was adopted, and the distribution of steganography noise was learned ...
Jinjin Liu   +4 more
openaire   +1 more source

BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma

open access: yesFEBS Open Bio, EarlyView.
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy