Results 51 to 60 of about 7,184,030 (395)
Ureteral tumor in an ectopic duplex system: a case report
Introduction Ureteral ectopia is a rarely observed anomaly. It may be totally asymptomatic. An association with a duplex system is exceptional. Diagnostic and therapeutic approaches are challenging. Carcinologic surgery must consider the anatomic variant,
Omar Karray+11 more
doaj +1 more source
Symbolic Quantitative Information Flow [PDF]
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P+3 more
core +1 more source
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan+2 more
wiley +1 more source
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan+4 more
doaj +1 more source
Pericytes change function depending on glioblastoma vicinity: emphasis on immune regulation
Pericytes alter their transcriptome depending on their proximity to the tumor core. In the tumor core, pericytes display a more active state with higher communication strength but with lower immune activation potential and a shift toward extracellular matrix production.
Carolina Buizza+5 more
wiley +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin+4 more
doaj +1 more source
Smart security management in secure devices [PDF]
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno+6 more
openaire +5 more sources
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts+8 more
wiley +1 more source
The BCG vaccine is given to millions of children globally but efficacy wanes over time and differences in the immune systems between infants and adults can influence vaccine efficacy.
Laura Sibley+10 more
doaj +1 more source
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli+4 more
wiley +1 more source