Results 91 to 100 of about 3,121 (282)
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds
Along with the rapid growth of cloud environments, rises the problem of secure data storage-a problem that both businesses and end-users take into consideration before moving their data online. Recently, a lot of solutions have been proposed based either
Alexandros Bakas +3 more
doaj +1 more source
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul +5 more
core +1 more source
This study discovered a new pathway that tells fruit flies when to stop eating. It found that rising blood sugar (fructose) is detected by a sensor called GR43a. This triggers a chain reaction involving the satiety signal sulfakinin and its receptor, ultimately activating a final satiety signal, ILP5.
Hong‐Fei Li +7 more
wiley +1 more source
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
ABSTRACT Triple‐negative breast cancer (TNBC) exhibits addiction to chronic endoplasmic reticulum (ER) stress, which sustains an aggressive metastatic phenotype through activation of the unfolded protein response (UPR). Here, we identify a previously unrecognized “ER‐stress addiction” axis in which the Hippo pathway effector TEAD4 directly ...
Yini Shang +9 more
wiley +1 more source
Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma +5 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang +21 more
wiley +1 more source

