Results 71 to 80 of about 184,016 (328)
In prostate carcinoma, lactic acid, secreted by highly glycolytic cancer‐associated fibroblasts, is imported into tumor cells through the MCT1 transporter and prevents RSL3 and erastin‐induced ferroptosis (A). Targeting of carbonic anhydrase IX/XII, the main extracellular pH regulators, in tumor and stromal cells reduces microenvironmental acidosis and
Elisa Pardella+18 more
wiley +1 more source
A Model-Based Approach to Security Analysis for Cyber-Physical Systems
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios+3 more
core +1 more source
Identifying prognostic targets in metastatic prostate cancer beyond AR
Genome‐wide functional screens combined with a large gene expression database and clinical outcomes can identify new therapeutic vulnerabilities in prostate cancer. Eight potentially druggable targets demonstrated strong dependency in cell lines, were associated with worse prognosis clinically, and showed evidence of protein expression in prostate ...
Emily Feng+13 more
wiley +1 more source
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim+6 more
doaj +1 more source
Current trends in single‐cell RNA sequencing applications in diabetes mellitus
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian+6 more
wiley +1 more source
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood.
Fang Qi+6 more
doaj +1 more source
DETEKSI KONDISI KETAHANAN PANGAN BERAS MENGGUNAKAN PEMODELAN SPASIAL KERENTANAN PANGAN
In 2005 and 2009, BKP and WFP has provided food security conditions in Indonesia on Food Insecurity Map which were developed using food availability, food accessibility, food absorption and food vulnerability.
Dede Dirgahayu+4 more
doaj +1 more source
Phenotypic plasticity in a newly established set of EGFR inhibitor‐adapted NSCLC cell lines during adaptation and in established cell lines. Here, we introduce novel sublines of the EGFR‐mutant non‐small cell lung cancer (NSCLC) cell lines HCC827 and HCC4006 adapted to the EGFR kinase inhibitors gefitinib (HCC827rGEFI2μm, HCC4006rGEFI1μm), erlotinib ...
Tharsagini V. Nanthaprakash+6 more
wiley +1 more source
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
Fault and Error Tolerance in Neural Networks: A Review
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj +1 more source