Results 61 to 70 of about 5,594,244 (311)
Constitutional and legal foundations for countering terrorism using cyberspace
Background. The article is devoted to the constitutional and legal foundations of countering terrorism using cyberspace. With the development of digital technologies, crimes using the Internet have become more and more prosperous.
P.A. Guk, P.V. Korshunova, O.N. Kulagina
doaj +1 more source
Accurately modeling the Internet topology [PDF]
Based on measurements of the Internet topology data, we found out that there are two mechanisms which are necessary for the correct modeling of the Internet topology at the Autonomous Systems (AS) level: the Interactive Growth of new nodes and new ...
Mondragon, Raul J., Zhou, Shi
core +3 more sources
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Contagion on the Internet [PDF]
To the Editor: Computer viruses are designed to be pests, proliferating in uncontrolled ways and causing severe damage to electronic data. These malignant programs, which amplify between files and computers, are strikingly similar in virulence, modes of spread, and evolutionary pathways over time to the microbes that cause infectious diseases.
Trudy M. Wassenaar, Martin J. Blaser
openaire +4 more sources
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik+4 more
wiley +1 more source
New Dimensions of Functional Illiteracy in the Digital Economy
We explore the new aspects of functional illiteracy associated with the inability to seamlessly fit into the new economic reality that requires mastering skills and technologies adequate to the digital economy. Data on the level of computer literacy and
Marina Baskakova, Irina Soboleva
doaj +1 more source
The Future of the Internet [PDF]
Presents findings from a survey of technology leaders, scholars, industry officials, and analysts. Evaluates the network infrastructure's vulnerability to attack, and the Internet's impact on various institutions and activities in the coming ...
Janna Quitney Anderson+2 more
core
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts+8 more
wiley +1 more source
Quantum networks offer a unifying set of opportunities and challenges across exciting intellectual and technical frontiers, including for quantum computation, communication, and metrology. The realization of quantum networks composed of many nodes and channels requires new scientific capabilities for the generation and characterization of quantum ...
openaire +6 more sources
We evaluated circulating tumor DNA (ctDNA) detection in advanced pancreatic cancer using DNA methylation, cell‐free DNA fragment lengths, and 5′ end motifs. Machine learning models were trained to estimate ctDNA levels from each feature and their combination.
Morten Lapin+10 more
wiley +1 more source