Results 101 to 110 of about 564,681 (292)

Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers

open access: yesMolecular Oncology, EarlyView.
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel   +6 more
wiley   +1 more source

Secret Image Sharing Based on Encrypted Pixels

open access: yesIEEE Access, 2018
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou   +3 more
doaj   +1 more source

Performance Analysis of Coded $M$-ary Orthogonal Signaling Using Errors-and Erasures Decoding Over Frequency-Selective Fading Channels

open access: yes, 2001
The performance of $M$-ary orthogonal signaling schemes employing Reed–Solomon (RS) codes and redundant residue number system (RRNS) codes is investigated over frequency-selective Rayleigh fading channels.
Hanzo, L., Yang, L-L.
core  

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

In-Network Filtering Schemes for Type-Threshold Function Computation in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data collection in wireless sensor networks (WSNs) can become extremely expensive in terms of power consumption if all measurements have to be fetched. However, since multiple applications do not require data from all nodes but to compute a function over
Guillermo G. Riva, Jorge M. Finochietto
doaj   +1 more source

Advances in Mid-IR Fiber Lasers: Tellurite, Fluoride and Chalcogenide

open access: yesFibers, 2017
A review on the recent progress in modeling and fabrication of medium infrared (Mid-IR) fiber lasers is reported. The main objective is to illustrate some recent examples of continuous wave optical sources at wavelengths longer than those commonly ...
Mario Christian Falconi   +2 more
doaj   +1 more source

Interrogating the immune landscape of microsatellite stable RAS‐mutated colon cancer

open access: yesMolecular Oncology, EarlyView.
COLOSSUS project RAS‐mutated MSS colon cancer study explored transcriptomics and immune cell density by immunohistochemistry (IHC), Immunoscore (IS), ISIC/TuLIS scores, mutation counts, and detected different prevalences but similar microenvironment composition across immune markers with clinical relevance for future immunotherapy combination ...
Rodrigo Dienstmann   +61 more
wiley   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang   +3 more
doaj   +1 more source

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy