Results 51 to 60 of about 9,433,709 (373)

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Private Networks [PDF]

open access: yesDigital Policy, Regulation and Governance, 2021
Peter Curwen, Jason Whalley
openaire   +1 more source

Penggunaan Virtual Private Network untuk Pengamanan Komunikasi pada VoIP [PDF]

open access: yes, 2014
Berkembangnya teknologi sekarang ini memacu untuk membuat teknologi yang semakin murah atau terjangkau. Seiring berkembangnya jaringan komputer yang semakin pesat memungkinkan untuk melewatkan trafik suara melalui jaringan komputer atau biasa yang ...
Setiawan, E. A. (Eko)   +1 more
core  

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

Implementation of 5G Standalone Private Network for UHD Video Streaming

open access: yesEmitor: Jurnal Teknik Elektro
The growing user preference for Ultra High Definition (UHD) video content on various Over-the-Top (OTT) platforms presents a significant challenge in Indonesia, where 5G network coverage is limited and primarily based on the Non-Standalone (NSA ...
Ahmad Adriansyah, Sopian Soim, Aryanti
doaj   +1 more source

Strategic Learning and the Topology of Social Networks [PDF]

open access: yes, 2015
We consider a group of strategic agents who must each repeatedly take one of two possible actions. They learn which of the two actions is preferable from initial private signals, and by observing the actions of their neighbors in a social network.
Mossel, Elchanan   +2 more
core   +3 more sources

Open source system OpenVPN in a function of Virtual Private Network

open access: yes, 2017
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure.
A. Skendzic, Bozidar Kovacic
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy