Results 111 to 120 of about 12,143,613 (336)

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Search Engine Users [PDF]

open access: yes, 2005
Presents findings from a survey conducted in May and June 2004. Looks at confidence in search ability; satisfaction with results; overall trust of search engines; and demographic differences among ...
Deborah Fallows
core  

Exploring the factors influencing the intention to use digital banking: The role of resonance FOMO as a moderator [PDF]

open access: yesBanks and Bank Systems
This study aims to explore the factors influencing individuals’ intention to use digital banking services and investigate the role of Resonance FOMO (Fear of Missing Out) in moderating the relationship between intention and actual usage behavior in ...
Anggi Oktawiranti   +3 more
doaj   +1 more source

Identification of serum protein biomarkers for pre‐cancerous lesions associated with pancreatic ductal adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns   +10 more
wiley   +1 more source

Strangelet search at RHIC

open access: yes, 2004
Two position sensitive Shower Maximum Detector (SMDs) for Zero-Degree Calorimeters (ZDCs) were installed by STAR before run 2004 at both upstream and downstream from the interaction point along the beam axis where particles with small rigidity are swept ...
Adams, J   +389 more
core   +1 more source

Analysis of the disaster characteristics of the M6.2 earthquake occurring in Jishishan County, Gansu Province, China, in 2023

open access: yes地震科学进展
A M6.2 earthquake (35.7°N, 102.79°E) occurred at 23:59 on December 18, 2023, in Jishishan County, Linxia Prefecture, Gansu Province, China. The waves spread widely causing extensive casualties and damage to buildings.
Mingyong Lu   +7 more
doaj   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Spatial Search

open access: yesSSRN Electronic Journal
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiaoming Cai   +2 more
openaire   +5 more sources

Seismic slope permanent displacement calculation based on improved Newmark model using upper bound solution of plastic mechanics

open access: yesScientific Reports
Based on a review of the fundamental principles of the Newmark sliding displacement method, this paper proposes an improved approach based on the upper bound solution of plastic mechanics, drawing on the theory of Academician Zuyu Chen, which states that
Pengxu Jing   +9 more
doaj   +1 more source

Data security and protection techniques in big data:a survey

open access: yes网络与信息安全学报, 2016
Big Data has attracted tremendous attention from all over the world nowadays.Its sheer volume,complex structure and realtime processing requirements often obsolete traditional technologies when coming to provide suffi-cient security protection.To address
Kai-min WEI,Jian WENG, Kui REN
doaj   +1 more source

Home - About - Disclaimer - Privacy