Results 81 to 90 of about 703,183 (313)

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Portable Low‐Field Magnetic Resonance Imaging in People With Human Immunodeficiency Virus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective The aging population of people with HIV (PWH) raises heightened concerns regarding accelerated aging and dementia. Portable, low‐field MRI (LF‐MRI) is an innovative technology that could enhance access and facilitate routine monitoring of PWH.
Annabel Sorby‐Adams   +14 more
wiley   +1 more source

Enhancing privacy with optical element design for fall detection

open access: yesElectronics Letters, 2023
Falling poses significant risks, especially for the geriatric population. In this study, the authors introduce an innovative approach to privacy‐preserving fall detection using computer vision. The authors’ technique leverages a deep neural network (DNN)
Liyun Gong, Sheldon Mccall, Miao Yu
doaj   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories

open access: yesIEEE Access
Privacy requirements engineering acts as a role to systematically elicit privacy requirements from system requirements and legal requirements such as the GDPR.
Guntur Budi Herwanto   +2 more
doaj   +1 more source

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

Frailty Exacerbates Disability in Progressive Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background To evaluate frailty in severe progressive multiple sclerosis (PMS) and to investigate the underlying mechanisms. Methods This prospective, cross‐sectional, multicenter study enrolled a late severe PMS group requiring skilled nursing (n = 53) and an age, sex, and disease duration‐matched control PMS group (n = 53).
Taylor R. Wicks   +10 more
wiley   +1 more source

Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]

open access: yes, 2018
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core  

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election

open access: yes, 2015
In the world's largest-ever deployment of online voting, the iVote Internet voting system was trusted for the return of 280,000 ballots in the 2015 state election in New South Wales, Australia.
F Zagórski   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy