Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source
In-Network Filtering Schemes for Type-Threshold Function Computation in Wireless Sensor Networks
Data collection in wireless sensor networks (WSNs) can become extremely expensive in terms of power consumption if all measurements have to be fetched. However, since multiple applications do not require data from all nodes but to compute a function over
Guillermo G. Riva, Jorge M. Finochietto
doaj +1 more source
Advances in Mid-IR Fiber Lasers: Tellurite, Fluoride and Chalcogenide
A review on the recent progress in modeling and fabrication of medium infrared (Mid-IR) fiber lasers is reported. The main objective is to illustrate some recent examples of continuous wave optical sources at wavelengths longer than those commonly ...
Mario Christian Falconi +2 more
doaj +1 more source
Pancreatic sensory neurons innervating healthy and PDAC tissue were retrogradely labeled and profiled by single‐cell RNA sequencing. Tumor‐associated innervation showed a dominant neurofilament‐positive subtype, altered mitochondrial gene signatures, and reduced non‐peptidergic neurons.
Elena Genova +14 more
wiley +1 more source
CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh +12 more
wiley +1 more source
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang +3 more
doaj +1 more source
Constructions of some secret sharing schemes based on linear codes [PDF]
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj +1 more source
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source
A New Security Measure in Secret Sharing Schemes and Secure Network Coding
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara +2 more
doaj +1 more source
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source

