Results 41 to 50 of about 3,206,915 (290)
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman +17 more
wiley +1 more source
This study aimed to develop a fully automated survival prediction (FASP) system that analyzes whole-liver regions from preoperative contrast-enhanced CT scans for predicting recurrence-free survival (RFS) after curative resection in Hepatocellular ...
Chao Huang +11 more
doaj +1 more source
πFL: Private, atomic, incentive mechanism for federated learning based on blockchain
Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. A plethora of incentive mechanism studies have been conducted with the objective of promoting the provision of ...
Kejia Chen +4 more
doaj +1 more source
Security Measures of Textual Data
As the volume and importance of textual data in data science continues to grow, combined with advancements in its techniques, it has created numerous opportunities for extracting valuable insights from textual information. However, privacy and the security of private data are issues that are brought up by the analysis of text data.
Smitha J A +3 more
openaire +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Data Synthesis and Importance of Big Data Security Analytics for Securing the Enterprise Data
Big data can be A data with large magnitude means it's large volume, velocity and variety. Currently a day's big data is enlarging in a various engineering and science disciplines. Because of rise in quantity of complex targeted dangers and accelerated increase in statistics, the investigation of data becomes overly hard.
B. Hema Kumari, V. Surya Narayana Reddy
openaire +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Graph Neural Networks in Point Clouds: A Survey
With the advancement of 3D sensing technologies, point clouds are gradually becoming the main type of data representation in applications such as autonomous driving, robotics, and augmented reality. Nevertheless, the irregularity inherent in point clouds
Dilong Li +5 more
doaj +1 more source

