Results 41 to 50 of about 13,284 (309)
Blockchain Technology for Trustworthy Operations in the Management of Strategic Grain Reserves
Food is a daily requirement for everyone, while production patterns are seasonal. Producing sufficient nutrients is becoming more difficult because water and soil resources are already stressed and are becoming increasingly strained by climate change ...
Adnan Iftekhar, Xiaohui Cui, Yiping Yang
doaj +1 more source
Screening for lung cancer: A systematic review of overdiagnosis and its implications
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz +12 more
wiley +1 more source
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own.
Zhaoxu Ji, Huanguo Zhang, Houzhen Wang
doaj +1 more source
Offline hand-drawn diagram recognition is concerned with digitizing diagrams sketched on paper or whiteboard to enable further editing. Some existing models can identify the individual objects like arrows and symbols, but they become involved in the ...
Jiaqi Fang, Zhen Feng, Bo Cai
doaj +1 more source
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués +3 more
wiley +1 more source
Virtual machine (VM) measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence, the secure storage for these data has attracted more attention recently.
Bo Zhao, Peiru Fan, Mingtao Ni
doaj +1 more source
Structure and Sequence Aligned Code Summarization with Prefix and Suffix Balanced Strategy
Source code summarization focuses on generating qualified natural language descriptions of a code snippet (e.g., functionality, usage and version). In an actual development environment, descriptions of the code are missing or not consistent with the code
Jianhui Zeng, Zhiheng Qu, Bo Cai
doaj +1 more source
Next‐generation proteomics improves lung cancer risk prediction
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj +4 more
wiley +1 more source
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes
Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection.
Botao Liu, Ming Tang
doaj +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source

