Results 101 to 110 of about 567,858 (283)

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

In-Network Filtering Schemes for Type-Threshold Function Computation in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data collection in wireless sensor networks (WSNs) can become extremely expensive in terms of power consumption if all measurements have to be fetched. However, since multiple applications do not require data from all nodes but to compute a function over
Guillermo G. Riva, Jorge M. Finochietto
doaj   +1 more source

Advances in Mid-IR Fiber Lasers: Tellurite, Fluoride and Chalcogenide

open access: yesFibers, 2017
A review on the recent progress in modeling and fabrication of medium infrared (Mid-IR) fiber lasers is reported. The main objective is to illustrate some recent examples of continuous wave optical sources at wavelengths longer than those commonly ...
Mario Christian Falconi   +2 more
doaj   +1 more source

Deciphering transcriptional plasticity in pancreatic ductal adenocarcinoma reveals alterations in sensory neuron innervation

open access: yesMolecular Oncology, EarlyView.
Pancreatic sensory neurons innervating healthy and PDAC tissue were retrogradely labeled and profiled by single‐cell RNA sequencing. Tumor‐associated innervation showed a dominant neurofilament‐positive subtype, altered mitochondrial gene signatures, and reduced non‐peptidergic neurons.
Elena Genova   +14 more
wiley   +1 more source

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang   +3 more
doaj   +1 more source

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov   +3 more
wiley   +1 more source

A New Security Measure in Secret Sharing Schemes and Secure Network Coding

open access: yesIEEE Access
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara   +2 more
doaj   +1 more source

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy