Results 71 to 80 of about 1,014,505 (247)
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla +9 more
wiley +1 more source
Entropy Approach to Modeling Information Security Systems and Processes
One possible approach to modeling the information security processes through the use of physical analogy with the second thermodynamics law is discussed.
A. A. Malyuk
doaj
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch +13 more
wiley +1 more source
Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No.
openaire +5 more sources
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
DDX3X induces mesenchymal transition of endothelial cells by disrupting BMPR2 signaling
Elevated DDX3X expression led to downregulation of BMPR2, a key regulator of endothelial homeostasis and function. Our co‐immunoprecipitation assays further demonstrated a molecular interaction between DDX3X and BMPR2. Notably, DDX3X promoted lysosomal degradation of BMPR2, thereby impairing its downstream signaling and facilitating endothelial‐to ...
Yu Zhang +7 more
wiley +1 more source
SUBSTANTIATION OF THE NEED TO IMPLEMENT A CONTINUOUS INFORMATION SECURITY PROCESS AT ENTERPRISES
The article discusses information security in the system of an industrial enterprise. Attention is focused on the need to implement a continuous information security process to protect all information assets from leaks, theft and unauthorized disclosure,
Elena N. Syshchikova +2 more
doaj +1 more source
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli +9 more
wiley +1 more source
ИНФОРМАЦИСКА БЕЗБЕДНОСТ ВО САД [PDF]
In the modern world, the IT security has grown into a part of the general concept of national security. The article argues that the parameters of the theory of information warfare arise from the fundamental postulates of the general theory of security ...
Ванчо КЕНКОВ
doaj

