Results 71 to 80 of about 413,254 (284)

Tumor mutational burden as a determinant of metastatic dissemination patterns

open access: yesMolecular Oncology, EarlyView.
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal   +4 more
wiley   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

An Optimized Indoor RFID Positioning System Using 3D Mobility Pattern

open access: yesAdvances in Electrical and Computer Engineering, 2014
Radio frequency identification (RFID) is the widely used identification system that uses radio frequency for the detection of object position. A new RFID technique for the localization of tags in a 3D space is presented in this study. According to this
REZA, A. W., RUI, T. T., KAUSAR, A. S.
doaj   +1 more source

EVN Observations of HESS J1943+213: Evidence for an Extreme TeV BL Lac Object [PDF]

open access: yes, 2016
We report on the 1.6 GHz (18 cm) VLBI observations of the unresolved, steady TeV source HESS J1943+213 located in the Galactic plane, performed with the European VLBI Network (EVN) in 2014.
Akiyama, Kazunori   +5 more
core   +2 more sources

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Interrogating the immune landscape of microsatellite stable RAS‐mutated colon cancer

open access: yesMolecular Oncology, EarlyView.
COLOSSUS project RAS‐mutated MSS colon cancer study explored transcriptomics and immune cell density by immunohistochemistry (IHC), Immunoscore (IS), ISIC/TuLIS scores, mutation counts, and detected different prevalences but similar microenvironment composition across immune markers with clinical relevance for future immunotherapy combination ...
Rodrigo Dienstmann   +61 more
wiley   +1 more source

Vulnerabilities in first-generation RFID-enabled credit cards [PDF]

open access: yes
Credit cards ; Radio frequency identification ...
Ari Juels   +4 more
core  

Radio frequency identification (RFID) technologies for locating warehouse resources: A conceptual framework [PDF]

open access: yes, 2012
Copyright @ 2012 Information Technology SocietyIn the supply chain, a warehouse is a crucial component for linking all chain parties. It is necessary to track the real time resource location and status to support warehouse operations effectively ...
Aktas, E, Ali, M, Hassan, M
core  

Radio-loud Narrow-Line Type 1 Quasars

open access: yes, 2006
We present the first systematic study of (non-radio-selected) radio-loud narrow-line Seyfert 1 (NLS1) galaxies. Cross-correlation of the `Catalogue of Quasars and Active Nuclei' with several radio and optical catalogues led to the identification of 11 ...
Antonucci R.   +38 more
core   +1 more source

Implementation of Sensor RFID: Carrying Sensor Information in the Modulation Frequency [PDF]

open access: yes, 2015
An approach that can be used for exploiting the sensing capabilities of radio-frequency identification (RFID) is presented and formulated. In this approach, sensor information is carried through the modulation frequency of RFID .
Islam, Md. Mazidul   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy