Results 271 to 280 of about 53,608 (389)
Cryptography and Steganography
openaire +2 more sources
Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa+13 more
wiley +1 more source
Vaccine for digital images against steganography. [PDF]
Li X, Wang Z.
europepmc +1 more source
Mitochondria contain two mitoribosome rescue factors, ICT1 and MTRFR (C12orf65). ICT1 also functions as a mitoribosomal protein in mice and humans, and its loss is lethal. Although Mtrfr knockout mice could not be generated, knockout zebrafish lines for ict1 and mtrfr were established.
Nobukazu Nameki+11 more
wiley +1 more source
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization. [PDF]
Dugyala R+7 more
europepmc +1 more source
20 Hz mechanical vibration induced A431 cancer cells' apoptosis without such effect on other healthy cell lines of L929 and C2C12. Lowered glucose consumption is observed specifically in A431. The expressions of ROS, HMGB1, and HSP1 levels initially increase and subsequently decrease in the cancer cell line, as opposed to L929 and C2C12, which ...
Wresti L. Anggayasti+5 more
wiley +1 more source
Sterilization of image steganography using self-supervised convolutional neural network. [PDF]
Liu J, Xu F, Zhao Y, Xin X, Liu K, Ma Y.
europepmc +1 more source
Abstract Background The dose‐averaged linear energy transfer (LETD) in proton therapy (PT) has in pre‐clinical studies been linked to the relative biological effectiveness (RBE) of protons. Until recently, the most common PT delivery method in prostate cancer has been double‐scattered PT, with LETD only available through dedicated Monte Carlo (MC ...
Rasmus Klitgaard+7 more
wiley +1 more source
A robust audio steganography technique based on image encryption using different chaotic maps. [PDF]
Nasr MA+6 more
europepmc +1 more source