Targeting Lactate and Lactylation in Cancer Metabolism and Immunotherapy
Lactate, once deemed a metabolic waste, emerges as a central regulator of cancer progression. This review elucidates how lactate and its epigenetic derivative, protein lactylation, orchestrate tumor metabolism, immune suppression, and therapeutic resistance.
Jiajing Gong +5 more
wiley +1 more source
Antibody–drug conjugates (ADCs) transform breast cancer therapy, yet resistance limits their durability. Emerging evidence reveals that ADC failure is not solely tumor‐intrinsic but shaped by dynamic tumor–microenvironment interactions that alter drug delivery, processing, and response.
Minji Seo, Jangsoon Lee, Naoto T. Ueno
wiley +1 more source
Nature inspired artificial intelligence based adaptive traffic flow distribution in computer network
Because of the stochastic nature of traffic requirement matrix, it is very difficult to get the optimal traffic distribution to minimize the delay even with adaptive routing protocol in a fixed connection network where capacity already defined for each link. Hence there is a requirement to define such a method, which could generate the optimal solution
openaire +2 more sources
Traffic flows analysis in high-speed computer networks using time series (Draft 2)
This article explores the required amount of time series points from a high-speed traffic network to accurately estimate the Hurst exponent. The methodology consists in designing an experiment using estimators that are applied to time series, followed by addressing the minimum amount of points required to obtain accurate estimates of the Hurst exponent
openaire +2 more sources
Traffic flows analysis in high-speed computer networks using time series (Draft 1)
This article explores the required amount of time series points from a high-speed traffic network to accurately estimate the Hurst exponent. The methodology consists in designing an experiment using estimators that are applied to time series, followed by addressing the minimum amount of points required to obtain accurate estimates of the Hurst exponent
openaire +2 more sources
Analysis of the compliance of traffic generated by modeling of applications flow with real traffic in computer networks [PDF]
M.A. Farashiani +1 more
openaire +1 more source
The Research of Traffic Flow Assignment Model based on the Network Calculus of Computer Network
Yali Peng +3 more
openaire +1 more source
Dynamic graph neural network-based framework to increase detection accuracy in SDN under DDOS. [PDF]
Kalafy SAA, Pashazadeh S, Salehpour P.
europepmc +1 more source
A hybrid machine learning approach for detecting DDoS attacks in software-defined networks. [PDF]
Mahar IA +5 more
europepmc +1 more source
An efficient three-tier defense mechanism for mitigation of DDoS attack with port connection analysis in SDN. [PDF]
Rajper A +5 more
europepmc +1 more source

