Results 91 to 100 of about 564,681 (292)
Adaptation of the modular number system in threshold secret sharing schemes
Objectives. The purpose of the research is to test the applicability of the adaptation of the modular number system using a masking transformation with a pseudo-random integer value to the original secret S in a modification of Adi Shamir’s (k, n ...
A. F. Chernyavskiy +3 more
doaj +1 more source
User-centric joint transmission coordinated multipoint (JT-CoMP) has been shown to enhance the capacity of terrestrial cellular systems, by overcoming cell-edge interference.
Muhammad D. Zakaria +4 more
doaj +1 more source
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things.
Mohammad Faisal +4 more
doaj +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Tumor mutational burden as a determinant of metastatic dissemination patterns
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal +4 more
wiley +1 more source
Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy GHZ States
We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states and bipartite graph states.
Chen, Kai, Lo, Hoi-Kwong
core +4 more sources
Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta +10 more
wiley +1 more source
Cotargeting TREM2 and IL2 pathways triggers multipronged anticancer immunity
Von Locquenghien et al. report that MiTE‐144, a triggering receptor expressed on myeloid cells 2 (TREM2) blocking antibody fused to interleukin‐2 (IL2) variant with tumour microenvironment restricted activation, demonstrates superior anticancer efficiency in a preclinical setting.
Isaure Vanmeerbeek +2 more
wiley +1 more source
Construction of dynamic threshold schemes
An (m, n) threshold scheme is to decompose a shared secret into n shares in such a way that the shared secret cannot be reclaimed unless any m shares are collected. A new dynamic threshold scheme that allows the shared secret to be updated without changing the shares is proposed.
H.-M. Sun, S.-P. Shieh
openaire +1 more source
To integrate multiple transcriptomics data with severe batch effects for identifying MB subtypes, we developed a novel and accurate computational method named RaMBat, which leveraged subtype‐specific gene expression ranking information instead of absolute gene expression levels to address batch effects of diverse data sources.
Mengtao Sun, Jieqiong Wang, Shibiao Wan
wiley +1 more source

