Results 321 to 330 of about 512,141 (378)

A Comprehensive Review of ns‐3‐Based Simulation Frameworks for LEO Satellite Constellations: Capabilities and Limitations

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Low Earth Orbit (LEO) satellite constellations are redefining the concept of global connectivity, opening up a new world of opportunities for communication services and applications. Purpose The emergence of LEO satellites (SATs) is ushering in a new era of innovation, where new complex technologies are being developed, and the use ...
Pilar Manzanares‐Lopez   +2 more
wiley   +1 more source

The regulatory effects and applications of TIGIT/CD155 on the tumor microenvironment in HCC

open access: yesVIEW, EarlyView.
Background The interaction between TIGIT and CD155 compromises immune cell efficacy in tumor targeting, potentially driving hepatocellular carcinoma (HCC) progression through diverse molecular pathways. What Was Done This study investigates the interplay between CD155 and TIGIT in regulating CD8+ T cell function and elucidates its implications in HCC ...
Wenting Li   +10 more
wiley   +1 more source

CRISPR/Cas9‐edited tumor‐associated immune cells in cancer immunotherapy

open access: yesVIEW, EarlyView.
Abstract Immuno‐oncology represents an emerging field that has significantly transformed tumor therapeutics, with immune cells serving as the cellular foundations of cancer immunotherapy. Due to its high efficiency and sensitivity, CRISPR/Cas9 genome editing is a highly promising technique for precise and rapid gene modification.
Yuhui Ma   +6 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Large Language Models With Contrastive Decoding Algorithm for Hallucination Mitigation in Low‐Resource Languages

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Neural machine translation (NMT) has advanced with deep learning and large‐scale multilingual models, yet translating low‐resource languages often lacks sufficient training data and leads to hallucinations. This often results in translated content that diverges significantly from the source text.
Zan Hongying   +4 more
wiley   +1 more source

Irradiation of prostate cancer alters circulating small extracellular vesicle functions. [PDF]

open access: yesSci Rep
Sayeed A   +12 more
europepmc   +1 more source

Cross‐Domain Graph Anomaly Detection via Graph Transfer and Graph Decouple

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Cross‐domain graph anomaly detection (CD‐GAD) is a promising task that leverages knowledge from a labelled source graph to guide anomaly detection on an unlabelled target graph. CD‐GAD classifies anomalies as unique or common based on their presence in both the source and target graphs.
Changqin Huang   +6 more
wiley   +1 more source

Taletrectinib promotes pyroptosis in colorectal carcinoma via SRC/AKT/mTOR axis inhibition. [PDF]

open access: yesSci Rep
Zhang T   +10 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy