Results 91 to 100 of about 480,128 (291)
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
Imposing and testing curvature conditions on a Box-Cox function [PDF]
We present a new method for imposing and testing concavity of a cost function using asymptotic least squares, which can easily be implemented even for cost functions which are nonlinear in parameters.
Falk, Martin +2 more
core
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff +11 more
wiley +1 more source
Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen-plaintext and chosen-ciphertext attacks still linger.
Saleh Ibrahim, Ayman Alharbi
doaj +1 more source
An Innovative Design of Substitution Box Using Trigonometric Transformation
As the number of hacking events and cyber threats keeps going up, it is getting harder and harder to communicate securely and keep personal information safe on the Internet. Cryptography is a very important way to deal with these problems because it can secure data by changing it from one form to another.
Ishaq, Kashif, Qarni, Awais Ahmed
openaire +2 more sources
Some special solutions to the Hyperbolic NLS equation
The Hyperbolic Nonlinear Schrodinger equation (HypNLS) arises as a model for the dynamics of three-dimensional narrowband deep water gravity waves. In this study, the Petviashvili method is exploited to numerically compute bi-periodic time-harmonic ...
Dutykh, Denys +2 more
core +2 more sources
Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta +10 more
wiley +1 more source
S-Boxهای پویای وابسته به کلید سبک وزن مبتنی بر ابرخم بیضوی برای دستگاه¬های اینترنت اشیا
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT
پروانه اصغری +1 more
doaj
The snoRNA MBII-52 (SNORD 115) is processed into smaller RNAs and regulates alternative splicing [PDF]
The loss of HBII-52 and related C/D box small nucleolar RNA (snoRNA) expression units have been implicated as a cause for the Prader-Willi syndrome (PWS). We recently found that the C/D box snoRNA HBII-52 changes the alternative splicing of the serotonin
Balwierz, Piotr J. +9 more
core

