Results 71 to 80 of about 1,014,505 (247)

IMPDH inhibition enhances cytarabine efficacy in SAMHD1‐expressing leukaemia cells via guanine nucleotide depletion

open access: yesMolecular Oncology, EarlyView.
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla   +9 more
wiley   +1 more source

Entropy Approach to Modeling Information Security Systems and Processes

open access: yesБезопасность информационных технологий, 2011
One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed.
A. A. Malyuk
doaj  

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Protecting personal information: Implications of the Protection of Personal Information (POPI) Act for healthcare professionals

open access: yesSouth African Medical Journal, 2017
Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No.
openaire   +5 more sources

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

DDX3X induces mesenchymal transition of endothelial cells by disrupting BMPR2 signaling

open access: yesFEBS Open Bio, EarlyView.
Elevated DDX3X expression led to downregulation of BMPR2, a key regulator of endothelial homeostasis and function. Our co‐immunoprecipitation assays further demonstrated a molecular interaction between DDX3X and BMPR2. Notably, DDX3X promoted lysosomal degradation of BMPR2, thereby impairing its downstream signaling and facilitating endothelial‐to ...
Yu Zhang   +7 more
wiley   +1 more source

SUBSTANTIATION OF THE NEED TO IMPLEMENT A CONTINUOUS INFORMATION SECURITY PROCESS AT ENTERPRISES

open access: yesНаука Красноярья
The article discusses information security in the system of an industrial enterprise. Attention is focused on the need to implement a continuous information security process to protect all information assets from leaks, theft and unauthorized disclosure,
Elena N. Syshchikova   +2 more
doaj   +1 more source

Antibiofilm activity of a chionodracine‐derived peptide by NMR‐based metabolomics of cell‐free supernatant of Acinetobacter baumannii clinical strains

open access: yesFEBS Open Bio, EarlyView.
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli   +9 more
wiley   +1 more source

ИНФОРМАЦИСКА БЕЗБЕДНОСТ ВО САД [PDF]

open access: yesBezbednosni Dijalozi, 2010
In the modern world, the IT security has grown into a part of the general concept of national security. The article argues that the parameters of the theory of information warfare arise from the fundamental postulates of the general theory of security ...
Ванчо КЕНКОВ
doaj  

Home - About - Disclaimer - Privacy