Results 51 to 60 of about 7,184,030 (395)

Ureteral tumor in an ectopic duplex system: a case report

open access: yesJournal of Medical Case Reports, 2019
Introduction Ureteral ectopia is a rarely observed anomaly. It may be totally asymptomatic. An association with a duplex system is exceptional. Diagnostic and therapeutic approaches are challenging. Carcinologic surgery must consider the anatomic variant,
Omar Karray   +11 more
doaj   +1 more source

Symbolic Quantitative Information Flow [PDF]

open access: yes, 2012
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P   +3 more
core   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism

open access: yesApplied Sciences, 2023
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan   +4 more
doaj   +1 more source

Pericytes change function depending on glioblastoma vicinity: emphasis on immune regulation

open access: yesMolecular Oncology, EarlyView.
Pericytes alter their transcriptome depending on their proximity to the tumor core. In the tumor core, pericytes display a more active state with higher communication strength but with lower immune activation potential and a shift toward extracellular matrix production.
Carolina Buizza   +5 more
wiley   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

Smart security management in secure devices [PDF]

open access: yesJournal of Cryptographic Engineering, 2016
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno   +6 more
openaire   +5 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Immune cell population dynamics following neonatal BCG vaccination and aerosol BCG revaccination in rhesus macaques

open access: yesScientific Reports
The BCG vaccine is given to millions of children globally but efficacy wanes over time and differences in the immune systems between infants and adults can influence vaccine efficacy.
Laura Sibley   +10 more
doaj   +1 more source

An optimized protocol to detect high‐throughput DNA methylation from custom targeted sequences on 96 samples simultaneously

open access: yesFEBS Open Bio, EarlyView.
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy