Results 51 to 60 of about 320,598 (293)
Analysis of treatment‐naïve high‐grade serous ovarian carcinoma (HGSOC) and control tissues for ERVs, LINE‐1 (L1), inflammation, and immune checkpoints identified five clusters with diverse patient recurrence‐free survivals. An inflammation score was calculated and correlated with retroelement expression, where one novel cluster (Triple‐I) with high ...
Laura Glossner +6 more
wiley +1 more source
Emerging role of ARHGAP29 in melanoma cell phenotype switching
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster +3 more
wiley +1 more source
Legal Basis for Using the Name of an Individual as a Character in a Work
The article examines the legal grounds, conditions, procedure, and purpose of using an individual’s name as a character in a third party’s work. Generally, assigning a real person’s name as a character (actor) to a literary or other creative work’s ...
Yuriy Nosik, Mykhailo Khomenko
doaj +1 more source
Following high dose rate brachytherapy (HDR‐BT) for hepatocellular carcinoma (HCC), patients were classified as responders and nonresponders. Post‐therapy serum induced increased BrdU incorporation and Cyclin E expression of Huh7 and HepG2 cells in nonresponders, but decreased levels in responders.
Lukas Salvermoser +14 more
wiley +1 more source
BUSINESS-TO-BUSINESS CORRUPTION [PDF]
The business corruption is established and active in the circle of the businesses partners that express a gratitude, return a service or bribes (apart from ordinary price) for a business transfer to be provided.
Natasha Georgieva Hadzi Krsteski
doaj +1 more source
Bitcoin as a Transaction Ledger: A Composable Treatment
Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing security proofs are property-based, and as such they do not support composition. In this work, we put forth a
Christian Badertscher +3 more
semanticscholar +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source
Autonomous Resource Request Transaction Framework Based on Blockchain in Social Network
Currently, blockchain technology has been widely researched and is being applied to many other fields, such as financial transactions, E-government, logistics, and supply-chain system.
Ke Gu, Linyu Wang, Weijia Jia
doaj +1 more source
Preventing Human Error on Online Transaction (A Case Study of B.com) [PDF]
Buying and selling transactions using internet media has advantages related to time and costs. However, buyers often feel difficult when accessing online websites.
Susanto Novie +4 more
doaj +1 more source
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang +8 more
wiley +1 more source

