Suggested Topics within your search.
Suggested Topics within your search.
-
721
The mechanism underlying metastasis in triple-negative breast cancer: focusing on the interplay between ferroptosis, epithelial-mesenchymal transition, and non-coding RNAs
Published 2025-01-01“…It is urgent to focus on identifying a workable and effective target for the treatment of TNBC. Cancer metastasis is significantly influenced by epithelial-mesenchymal transition (EMT). …”
Get full text
Article -
722
AKT: A Central Node in Complex Signaling Cascades
Published 2025-05-01“…Finally, we discuss strategies that might lead to more effective targeting of Akt for clinical cancer therapy.…”
Get full text
Article -
723
An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos
Published 2025-02-01“…The algorithm dynamically constructs a DNAS_box using 2-bit deoxyribonucleic acid (DNA) coding and 4-bit DNA-like coding, enabling seamless conversion between these two coding schemes. …”
Get full text
Article -
724
Pyramidal Predictive Network V2: An Improved Predictive Architecture and Training Strategies for Future Perception Prediction
Published 2025-03-01“…In this paper, we propose an improved version of the Pyramidal Predictive Network (PPNV2), a theoretical framework inspired by predictive coding, which addresses the limitations of its predecessor (PPNV1) in the task of future perception prediction. …”
Get full text
Article -
725
CircRNA-based AntimiR therapy: A novel approach to hypertension treatment
Published 2025-08-01“…The increasing recognition of the types and functions of non-coding RNAs has opened new avenues for their use as novel therapeutic strategies in the treatment of chronic diseases such as hypertension. …”
Get full text
Article -
726
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
727
-
728
Sequence simplification of antigen coding IVT mRNA allows accelerated synthetic DNA template generation and epitope immunogenicity validation
Published 2025-09-01“…After initial investigation, showcasing the effect of sequence, or chemical, modifications on mRNA translation and protein expression, we validated the effect of a structural deconstruction on antigen coding mRNA, observing preserved antigen presentation upon removal of stabilizing structures like the 5′ and 3′ UTRs and poly-A tail. …”
Get full text
Article -
729
The self-checking integrated control circuits synthesis based on the boolean complement method to "2-out-of-4" constant-weight code
Published 2018-12-01“…The article explores the peculiarities of self-checking integrated control circuits synthesis by the Boolean complement method based on the "2-out-of-4'' constant-weight code. The article describes the features of integrated control circuits implementation by the Boolean complement method. …”
Get full text
Article -
730
Use of the thermo-hydraulic system code RELAP5/MOD3.2 to transient analysis events of the VR-1 reactor
Published 2025-05-01“…Key findings highlight the significant influence of user effects and reactor vessel nodalisation on the accuracy and reliability of these predictions. …”
Get full text
Article -
731
La grande muraille de Gortyne sans lecteur ? Le soi-disant Code comme monument d’apparat civique
Published 2022-12-01“…Résumé : L’inscription IC iv 72, communément appelée « code de Gortyne », est l’une des plus longues inscriptions grecques connues. …”
Get full text
Article -
732
Epigenetic influence of long non-coding RNAs on the development of insulin resistance in metabolically associated fatty liver disease (part 1)
Published 2025-04-01“…MAFLD is associated with a high risk of developing T2DM, its presence increases the likelihood of T2DM by approximately two times during the next five years of the patient’s life. Long non-coding RNAs are directly involved in the development of IR, the determination of the level of their expression can significantly increase the effectiveness of diagnosis and prognosis of the disease. …”
Get full text
Article -
733
-
734
Development of Enrichment Book of Banjarnegara Folktales in Ngapak Dialect Assisted by Audio Quick Response (QR) Code for High School Students
Published 2025-04-01“…According to the results of the expert validation test, the product received a total score of 382, indicating it is feasible. Furthermore, the effectiveness test results showed a significance value of 0.00, confirming its effectiveness.…”
Get full text
Article -
735
Employing a low-code machine learning approach to predict in-hospital mortality and length of stay in patients with community-acquired pneumonia
Published 2025-01-01“…The potential of machine learning to enhance prediction accuracy in this context is significant, yet clinicians often lack the programming skills required for effective data mining. This study aimed to assess the effectiveness of a low-code approach for assisting clinicians with data mining for mortality and length of stay (LOS) prediction in patients with CAP. …”
Get full text
Article -
736
-
737
A Significant Commitment: The Introduction of a Unified European Code on ADRS to Regulate Consumer Disputes. Several Challenges in the Enforcement Area
Published 2025-05-01“…In this regard, for a comprehensive and diversified overview of the topic, particular attention will be given to the creation of a European unified code where the effectiveness of protection receives new and more significant importance. …”
Get full text
Article -
738
-
739
BioDeepfuse: a hybrid deep learning approach with integrated feature extraction techniques for enhanced non-coding RNA classification
Published 2024-12-01“…The accurate classification of non-coding RNA (ncRNA) sequences is pivotal for advanced non-coding genome annotation and analysis, a fundamental aspect of genomics that facilitates understanding of ncRNA functions and regulatory mechanisms in various biological processes. …”
Get full text
Article -
740
Development of a Clinical Decision Support System for Evidence-Based Management of Hypertension in Older Patients Using a No-code Platform
Published 2025-02-01“…Physicians are in need of comprehensive assessment tools to effectively manage hypertension in older patients.We conducted a literature search and evaluated current studies, systematic reviews and meta-analyses, exploring the relationship between hypertension and frailty. …”
Get full text
Article