Results 231 to 240 of about 3,116,576 (279)

USP29‐regulated noncanonical stabilization of the hypoxia‐inducible factor‐α in aggressive prostate cancer

open access: yesMolecular Oncology, EarlyView.
We identify USP29 as the only DUB mirroring CA9 expression, a marker of hypoxia and HIF pathway activation associated with PCA aggressiveness. USP29 stabilizes HIF‐1α and HIF‐2α via a noncanonical mechanism that is independent of PHD/pVHL activity yet relies on proteasomal regulation, establishing USP29 as a previously unrecognized regulator of hypoxic
Amelie S Schober   +16 more
wiley   +1 more source

Automated FRAP microscopy for high‐throughput analysis of protein dynamics in chromatin organization and transcription

open access: yesFEBS Open Bio, EarlyView.
RoboMic is an automated confocal microscopy pipeline for high‐throughput functional imaging in living cells. Demonstrated with fluorescence recovery after photobleaching (FRAP), it integrates AI‐driven nuclear segmentation, ROI selection, bleaching, and analysis.
Selçuk Yavuz   +6 more
wiley   +1 more source

A logical step in detecting cancer.

open access: yesCanadian family physician Medecin de famille canadien, 2012
openaire   +1 more source

Step-by-step Detection of Personally Collocated Mobile Devices

Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015
Many people now carry multiple mobile devices on a daily basis. Wearables, smartphones, tablets, and laptops all have their different advantages, but collectively they can increase a user's device management burden. Management problems include leaving a device behind accidentally, receiving notifications on the wrong device, and failing to secure all ...
Animesh Srivastava   +3 more
openaire   +1 more source

Adaptive Step Detection Algorithm for Wireless Smart Step Counter

2013 International Conference on Information Science and Applications (ICISA), 2013
we had designed and implemented a smart step counter with adaptive step detection algorithm that can enhance the accuracy of step detection using step amplitude. This algorithm can pick step count out over 99% of accuracy through the adaptive step detection algorithm.
UkJae Ryu   +6 more
openaire   +2 more sources

DDoS flooding attack detection through a step-by-step investigation

2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications, 2011
Internet users are increases, distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect.
Jae-Hyun Jun   +2 more
openaire   +1 more source

Watch Your Step! Detecting Stepping Stones in Programmable Networks

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 — Panama Papers Leak.
Gurtov, Andrei   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy