Results 71 to 80 of about 184,016 (328)

Targeting carbonic anhydrase IX/XII prevents the anti‐ferroptotic effect of stromal lactic acid in prostate carcinoma

open access: yesMolecular Oncology, EarlyView.
In prostate carcinoma, lactic acid, secreted by highly glycolytic cancer‐associated fibroblasts, is imported into tumor cells through the MCT1 transporter and prevents RSL3 and erastin‐induced ferroptosis (A). Targeting of carbonic anhydrase IX/XII, the main extracellular pH regulators, in tumor and stromal cells reduces microenvironmental acidosis and
Elisa Pardella   +18 more
wiley   +1 more source

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

open access: yes, 2018
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios   +3 more
core   +1 more source

Identifying prognostic targets in metastatic prostate cancer beyond AR

open access: yesFEBS Open Bio, EarlyView.
Genome‐wide functional screens combined with a large gene expression database and clinical outcomes can identify new therapeutic vulnerabilities in prostate cancer. Eight potentially druggable targets demonstrated strong dependency in cell lines, were associated with worse prognosis clinically, and showed evidence of protein expression in prostate ...
Emily Feng   +13 more
wiley   +1 more source

Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods

open access: yesSensors
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim   +6 more
doaj   +1 more source

Current trends in single‐cell RNA sequencing applications in diabetes mellitus

open access: yesFEBS Open Bio, EarlyView.
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian   +6 more
wiley   +1 more source

Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design

open access: yesIEEE Transactions on Quantum Engineering
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood.
Fang Qi   +6 more
doaj   +1 more source

DETEKSI KONDISI KETAHANAN PANGAN BERAS MENGGUNAKAN PEMODELAN SPASIAL KERENTANAN PANGAN

open access: yesJournal of Natural Resources and Environmental Management, 2012
In 2005 and 2009, BKP and WFP has provided food security conditions in Indonesia on Food Insecurity Map which were developed using food availability, food accessibility, food absorption and food vulnerability.
Dede Dirgahayu   +4 more
doaj   +1 more source

Phenotypic plasticity in a novel set of EGFR tyrosine kinase inhibitor‐adapted non‐small cell lung cancer cell lines

open access: yesFEBS Open Bio, EarlyView.
Phenotypic plasticity in a newly established set of EGFR inhibitor‐adapted NSCLC cell lines during adaptation and in established cell lines. Here, we introduce novel sublines of the EGFR‐mutant non‐small cell lung cancer (NSCLC) cell lines HCC827 and HCC4006 adapted to the EGFR kinase inhibitors gefitinib (HCC827rGEFI2μm, HCC4006rGEFI1μm), erlotinib ...
Tharsagini V. Nanthaprakash   +6 more
wiley   +1 more source

SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH

open access: yesTASK Quarterly, 2013
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj  

Fault and Error Tolerance in Neural Networks: A Review

open access: yesIEEE Access, 2017
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj   +1 more source

Home - About - Disclaimer - Privacy