Results 41 to 50 of about 150,216 (340)
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu+12 more
wiley +1 more source
Survey of research on confidential computing
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng+5 more
doaj +1 more source
A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj +1 more source
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song+11 more
wiley +1 more source
With the trend of large-scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system ...
Qiuyu Lu, Jun’e Li, Zhao Peng, Ming Ni
doaj +1 more source
Fourteen Limit Cycles in a Seven-Degree Nilpotent System
Center conditions and the bifurcation of limit cycles for a seven-degree polynomial differential system in which the origin is a nilpotent critical point are studied. Using the computer algebra system Mathematica, the first 14 quasi-Lyapunov constants of
Wentao Huang, Ting Chen, Tianlong Gu
doaj +1 more source
TRIM24 and TRIM28 are androgen receptor (AR) coregulators which exhibit increased expression with cancer progression. Both TRIM24 and TRIM28 combine to influence the response of castrate‐resistant prostate cancer (CRPC) cells to AR inhibitors by mediating AR signalling, regulation of MYC and upregulating VEGF to promote angiogenesis. Castrate‐resistant
Damien A. Leach+8 more
wiley +1 more source
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan+4 more
doaj +1 more source
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew+18 more
core +1 more source