Results 51 to 60 of about 102,340 (326)

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Optimal structural similarity constraint for reversible data hiding

open access: yes网络与信息安全学报, 2016
Most reversible data hiding (RDH) techniques have been evaluated by PSNR,which is based on MSE.Unfortunately,MSE turns out to be an extremely poor measure when the purpose is to predict perceived signal fidel-ity or quality.The structural similarity ...
Jia-jia XU   +4 more
doaj   +3 more sources

Reversible Data Hiding Based on Improved Multilevel Histogram Modification of Pixel Differences [PDF]

open access: yes
[[abstract]]The technique of reversible data hiding recovers the original image without distortion from a stego-image after the hidden data have been extracted.
Hung, Kuo-Ming
core   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Reversible Data Hiding scheme using modified Histogram Shifting in Encrypted Images for Bio-medical images [PDF]

open access: yes, 2018
Existing Least Significant Bit (LSB) steganography system is less robust and the stego-images can be corrupted easily by attackers. To overcome these problems Reversible data hiding (RDH) techniques are used.
Arunkumar, S   +2 more
core  

Evaluation of a Novel Electric Health Record Sidecar Application to Display Rheumatoid Arthritis Clinical Outcomes During Clinic Visits: Results of a Stepped‐Wedge Cluster Randomized Pragmatic Trial

open access: yesArthritis Care &Research, EarlyView.
Objective We developed a novel electronic health record sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk   +16 more
wiley   +1 more source

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Reversible Data Hiding in Encrypted Images With Dual Data Embedding

open access: yesIEEE Access, 2020
Typical reversible data hiding in encrypted image (RDH-EI) methods merely embed data in the encrypted domain, ignoring the requirement of the image owner for data embedding.
Yingqiang Qiu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy