Results 51 to 60 of about 160,167 (287)
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués +3 more
wiley +1 more source
Blockchain Technology for Trustworthy Operations in the Management of Strategic Grain Reserves
Food is a daily requirement for everyone, while production patterns are seasonal. Producing sufficient nutrients is becoming more difficult because water and soil resources are already stressed and are becoming increasingly strained by climate change ...
Adnan Iftekhar, Xiaohui Cui, Yiping Yang
doaj +1 more source
Socially Trusted Collaborative Edge Computing in Ultra Dense Networks
Small cell base stations (SBSs) endowed with cloud-like computing capabilities are considered as a key enabler of edge computing (EC), which provides ultra-low latency and location-awareness for a variety of emerging mobile applications and the Internet ...
Chen, Lixing, Xu, Jie
core +1 more source
Next‐generation proteomics improves lung cancer risk prediction
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj +4 more
wiley +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own.
Zhaoxu Ji, Huanguo Zhang, Houzhen Wang
doaj +1 more source
Offline hand-drawn diagram recognition is concerned with digitizing diagrams sketched on paper or whiteboard to enable further editing. Some existing models can identify the individual objects like arrows and symbols, but they become involved in the ...
Jiaqi Fang, Zhen Feng, Bo Cai
doaj +1 more source
KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan +16 more
wiley +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +3 more sources
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes
Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection.
Botao Liu, Ming Tang
doaj +1 more source

