Results 81 to 90 of about 9,853 (272)
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network, vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle-to-infrastructure (V2I) transmission links in order to accommodate ...
Bin Qiu +4 more
doaj +1 more source
Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi +12 more
wiley +1 more source
Cooperative jamming for secrecy in decentralized wireless networks
Cooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing ...
Kennedy, Rodney +2 more
core +1 more source
Additive Manufacturing of Patient‐Specific Intracranial Aneurysm Cell Culture Models
Patient‐specific intracranial aneurysm models were fabricated using chocolate moulding, 3D printed water‐soluble cores, and direct resin 3D printing. Moulding PDMS around sacrificial cores made of chocolate or 3D printed water‐soluble resin yielded accurate, expandable, and endothelializable models that outperformed resin‐based approaches.
Chloe M. de Nys +6 more
wiley +1 more source
The functional schematic diagram of tumor associated neutrophils. Abstract Enhancing cervical cancer (CC) immunotherapy requires deciphering the heterogeneous tumor immune microenvironment (TIME), particularly neutrophil phenotypic dynamics. Here, 1) we collected 543 CC cases to find that patients with elevated neutrophil levels have a higher incidence
Xingyu Chang +7 more
wiley +1 more source
An entity‐centric foundation model, GloPath, is introduced for comprehensive glomerular lesion assessment from routine renal biopsy images. Trained on over one million glomeruli, the framework enables robust lesion recognition, grading, and cross modality diag nosis, while uncovering large‐scale clinicopathological associations.
Qiming He +28 more
wiley +1 more source
Centralized and Cooperative Transmission of Secure Multiple Unicasts using Network Coding [PDF]
We introduce a method for securely delivering a set of messages to a group of clients over a broadcast erasure channel where each client is interested in a distinct message. Each client is able to obtain its own message but not the others'.
Kennedy, Rodney +2 more
core
We identified GRIA2 as a critical driver of gastric cancer peritoneal metastasis through in vivo CRISPR screening. Mechanistically, GRIA2‐mediated calcium influx inhibits GSK3β and activates Wnt/β‐catenin signaling, driven by glutamate from cancer‐associated fibroblasts.
Jie Sun +13 more
wiley +1 more source
Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay
In this paper, we investigate secure uplink transmission in a typical Internet of Things (IoT) deployment, where multiple sensors communicate with a controller via the assistance of an untrusted relay.
Dechuan Chen +4 more
doaj +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source

