Results 231 to 240 of about 5,834,162 (365)
ACHealthChain blockchain framework for access control and privacy preservation in healthcare. [PDF]
Tawfik AM+3 more
europepmc +1 more source
Determination of ADP/ATP translocase isoform ratios in malignancy and cellular senescence
The individual functions of three isoforms exchanging ADP and ATP (ADP/ATP translocases; ANTs) on the mitochondrial membrane remain unclear. We developed a method for quantitatively differentiating highly similar human ANT1, ANT2, and ANT3 using parallel reaction monitoring. This method allowed us to assess changes in translocase levels during cellular
Zuzana Liblova+18 more
wiley +1 more source
Early Validation and Verification of a Distributed Role-Based Access Control Model
Saad Zafar+4 more
openalex +2 more sources
Enhancing security in electromagnetic radiation therapy using fuzzy graph theory. [PDF]
Lal R, Singh RK, Nishad DK, Khalid S.
europepmc +1 more source
Breast cancer metastasis is associated with myeloid cell dysregulation and the lung‐specific accumulation of tumor‐supportive Gr1+ cells. Gr1+ cells support metastasis, in part, through a CHI3L1‐mediated mechanism, which can be targeted and inhibited with cargo‐free, polymeric nanoparticles.
Jeffrey A. Ma+9 more
wiley +1 more source
Eliminating malaria in Nigeria: insights from Egypt's success and pathways to sustainable eradication. [PDF]
Eneh SC+9 more
europepmc +1 more source
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu+12 more
wiley +1 more source
Automated verification of role-based access control security models recovered from dynamic web applications [PDF]
Manar H. Alalfi+2 more
openalex +1 more source
Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices. [PDF]
Wang E+8 more
europepmc +1 more source