Results 41 to 50 of about 103,550 (267)
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
COMPETITIVENESS OF AN ENTERPRISE’S BUSINESS ACTIVITY AND FACTOR DETERMINING IT
Objective: to identify the necessity to introduce the concept of "competitiveness of business activity of an organization" in the services sector, to define the content of this concept and to analyze the main factors contributing to the competitiveness ...
P. I. Kuz’Mina
doaj
Purpose. Continuous increase in network traffic in the information-telecommunication system (ITS) of Prydniprovsk Railways leads to the need to determine the real-time network congestion and to control the data flows.
V. M. Pakhomovа
doaj +1 more source
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang +12 more
wiley +1 more source
Instance Based Classification for Decision Making in Network Data
Network data analysis helps in capturing node usage behavior. Existing algorithms use reduced feature set to manage high runtime complexity. Ignoring features may increase classification errors.
Lal Shankar +2 more
doaj +1 more source
Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley +1 more source
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. An intelligent system is essential to analyse and identify network traffic accurately.
Faiz Ul Islam +3 more
doaj +1 more source
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam +3 more
doaj +1 more source
SIRT4 positively regulates autophagy via ULK1, but independently of HDAC6 and OPA1
Cells expressing SIRT4 (H161Y), a catalytically inactive mutant of the sirtuin SIRT4, fail to upregulate LC3B‐II and exhibit a reduced autophagic flux under stress conditions. Interestingly, SIRT4(H161Y) promotes phosphorylation of ULK1 at S638 and S758 that are associated with inhibition of autophagy initiation.
Isabell Lehmkuhl +13 more
wiley +1 more source
Network anomaly detection and classification is an important open issue in network security. Several approaches and systems based on different mathematical tools have been studied and developed, among them, the Anomaly-Network Intrusion Detection System (
Jayro Santiago-Paz +3 more
doaj +1 more source

