Results 111 to 120 of about 1,346,642 (294)

Antiemesis Corticosteroids Potentiate Checkpoint Blockade Efficacy by Normalizing the Immune Microenvironment in Metastatic Murine Breast Cancer

open access: yesAdvanced Science, EarlyView.
Corticosteroids improve the efficacy of immune checkpoint blockade therapy in metastatic murine breast cancer. By normalizing the tumor immune microenvironment, corticosteroids reduce immunosuppressive signals, restore T‐cell function, and promote antitumor immune responses, resulting in enhanced tumor control.
John D. Martin   +19 more
wiley   +1 more source

Performance Evaluation and Analysis of LightCert4IoT Using Cooja-Contiki Simulator

open access: yesIEEE Access
Recently, the focus on the Internet of Things (IoT) has rocketed in parallel with the evolution of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects billions of devices, a 5G network is essential.
David Khoury   +5 more
doaj   +1 more source

Returns to Investment in Agriculture [PDF]

open access: yes
Investment in agriculture is necessary for ensuring rapid economic growth and poverty reduction in Zambia, as elsewhere in Africa. Yet many of the key investments required to accelerate agricultural growth – technological research, rural infrastructure ...
Haggblade, Steven
core   +1 more source

The Promise of a Healthy California: Overcoming the Barriers for Men and Boys of Color [PDF]

open access: yes, 2010
PolicyLink argues for a community approach to expanding opportunities for men and boys of color, acknowledging the importance of "place" to ultimate life outcomes. The report takes key conclusions from "Building Equalizing Schools" and expands on it with
Dwayne Marsh   +6 more
core  

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

A Framework to Create a Certificate for e-Commerce Secure Transaction Protocol

open access: yesInternational Journal of Information and Communication Technology Research, 2017
The development of e-commerce requires security to win the confidence of its stakeholders. Among the common protocols to establish safe financial transactions, Secure Electronic Transaction (SET) protocol has more security providing a safe protocol of ...
Nasrin Alishirvani
doaj  

Auctions for Infrastructure Concessions with Demand Uncertainty and Unknown Costs [PDF]

open access: yes
Auction mechanisms commonly used in practice for awarding infrastructure concession contracts induce a bias towards the selection of concessionaires who are optimistic about demand, but are not necessarily cost-efficient.
de Rus, Gines, Nombela, Gustavo
core   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy