Results 31 to 40 of about 82,373 (261)
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang +12 more
wiley +1 more source
This paper presents TCReC, an innovative model designed for reconstructing network traffic characteristics in the presence of packet loss. With the rapid expansion of wireless networks driven by edge computing, IoT, and 5G technologies, challenges such ...
Jiawei Ye +5 more
doaj +1 more source
Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley +1 more source
SIRT4 positively regulates autophagy via ULK1, but independently of HDAC6 and OPA1
Cells expressing SIRT4 (H161Y), a catalytically inactive mutant of the sirtuin SIRT4, fail to upregulate LC3B‐II and exhibit a reduced autophagic flux under stress conditions. Interestingly, SIRT4(H161Y) promotes phosphorylation of ULK1 at S638 and S758 that are associated with inhibition of autophagy initiation.
Isabell Lehmkuhl +13 more
wiley +1 more source
The increasing sophistication and frequency of Distributed Denial of Service (DDoS) attacks necessitate advanced detection systems. These attacks leave networks vulnerable to disruptions, resource overload, security breaches, and financial losses ...
Ali Tariq Kalil Al-Khayyat +1 more
doaj +1 more source
A Review on Internet Traffic Classification Based on Artificial Intelligence Techniques
Almost every industry has revolutionized with Artificial Intelligence. The telecommunication industry is one of them to improve customers' Quality of Services and Quality of Experience by enhancing networking infrastructure capabilities which could lead ...
Mohammad Pooya Malek +2 more
doaj
Critical Traffic Analysis on the Tor Network
Tor is a widely-used anonymity network with more than two million daily users. A prominent feature of Tor is the hidden service architecture. Hidden services are a popular method for communicating anonymously or sharing web contents anonymously.
Florian Platzer +2 more
openaire +2 more sources
BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru +6 more
wiley +1 more source
With the escalating global cyber threats, Distributed Denial of Service (DDoS) attacks have become one of the most disruptive and prevalent network attacks.
Yi Li, Xingzhou Deng, Ang Yang, Jing Gao
doaj +1 more source

