Results 81 to 90 of about 567,858 (283)
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj
Adaptively secure, splittable, and robust threshold unsigncryption
As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various ...
Yuxin Tong +4 more
doaj +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P. +1 more
doaj +1 more source
Threshold and non-linear behavior of lasers of $\Lambda$ and V - configurations
Dynamic properties of closed three level laser systems are investigated. Two schemes of pumping - $\Lambda$ and V - are considered. It is shown that the non-linear behavior of the photon number as a function of pump both near and far above threshold is ...
A. E. Sigman +14 more
core +1 more source
Tumor mutational burden as a determinant of metastatic dissemination patterns
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal +4 more
wiley +1 more source
Adaptation of the modular number system in threshold secret sharing schemes
Objectives. The purpose of the research is to test the applicability of the adaptation of the modular number system using a masking transformation with a pseudo-random integer value to the original secret S in a modification of Adi Shamir’s (k, n ...
A. F. Chernyavskiy +3 more
doaj +1 more source
User-centric joint transmission coordinated multipoint (JT-CoMP) has been shown to enhance the capacity of terrestrial cellular systems, by overcoming cell-edge interference.
Muhammad D. Zakaria +4 more
doaj +1 more source
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things.
Mohammad Faisal +4 more
doaj +1 more source

