![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessUnderstanding the Remplissage: History, Biomechanics, Outcomes, and Current Indications
Arthroscopic remplissage has continued to gain popularity as an adjunct to Bankart repair for patients with anterior shoulder instability. Although the original remplissage technique was described over 15 year...
-
Article
Open AccessSustainable 3D printing by reversible salting-out effects with aqueous salt solutions
Achieving a simple yet sustainable printing technique with minimal instruments and energy remains challenging. Here, a facile and sustainable 3D printing technique is developed by utilizing a reversible saltin...
-
Chapter and Conference Paper
PECSOnline: A Bespoke Classroom Based Picture Exchange Communication System (PECS) for Children with Autism
We present PECSOnline, a Picture Exchange Communication System (PECS) tailored to meet the specific needs of classroom environments rather than an individual. To ensure the tool would meet the practical requir...
-
Chapter and Conference Paper
A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones
Drones are being diversely used in various areas due to their low price. Most of the use cases demand a secure and reliable wireless communication infrastructure to ensure the quality of service. Such demand b...
-
Article
Efficacy of different dosing schedules of capecitabine for metastatic breast cancer: a single-institution experience
Purpose Capecitabine is widely used as a single agent on a 21-day cycle in the management of metastatic breast cancer (MBC). Our primary objective was to compare the standard dosing of capecitabine (Arm A: days 1...
-
Article
Open AccessAssessment of outcomes and novel immune biomarkers in metaplastic breast cancer: a single institution retrospective study
Metaplastic breast cancer remains poorly characterized given its rarity and heterogeneity. The majority of metaplastic breast cancers demonstrate a phenotype of triple-negative breast cancer; however, differen...
-
Article
Distinct, sex-dependent miRNA signatures in piglet hippocampus induced by a clinically relevant isoflurane exposure: a pilot study
To evaluate the effects of sex on miRNA expression in the hippocampus after isoflurane anesthesia in a neonatal piglet model.
-
Article
Open AccessAberrant enhancer hypomethylation contributes to hepatic carcinogenesis through global transcriptional reprogramming
Hepatocellular carcinomas (HCC) exhibit distinct promoter hypermethylation patterns, but the epigenetic regulation and function of transcriptional enhancers remain unclear. Here, our affinity- and bisulfite-ba...
-
Chapter and Conference Paper
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol
Storing data in the blockchain brings many benefits. The block-and-chain structure protects the data stored in the blockchain from unauthorised changes. The data will also be duplicated to all nodes which main...
-
Chapter and Conference Paper
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System
We revisit the problem of constructing public key encryption (PKE) secure against both key-leakage and tampering attacks
-
Chapter and Conference Paper
Anonymity Reduction Attacks to Monero
Monero is one of the most valuable cryptocurrencies in the market, focusing on users’ privacy. The built-in features in Monero help users to obfuscate the information of the senders and the receivers, hence a...
-
Chapter and Conference Paper
Evaluating CryptoNote-Style Blockchains
To hide user identity, blockchain-based cryptocurrencies utilize public key based coin addresses to represent users. However, the user identity can still be identified by linking the coin addresses to the IP a...
-
Chapter and Conference Paper
Position Paper on Blockchain Technology: Smart Contract and Applications
Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component...
-
Chapter and Conference Paper
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud
ABE (Attribute-based encryption) is capable of fine-grained data encryption, and thus has been studied for secure cloud data sharing. While a number of efforts have been dedicated to resolving the user revocat...
-
Article
Open AccessRoles of Distal and Genic Methylation in the Development of Prostate Tumorigenesis Revealed by Genome-wide DNA Methylation Analysis
Aberrant DNA methylation at promoters is often linked to tumorigenesis. But many aspects of DNA methylation remain unexplored, including the individual roles of distal and gene body methylation, as well as the...
-
Article
Open AccessGenome-wide DNA methylation analysis reveals estrogen-mediated epigenetic repression of metallothionein-1 gene cluster in breast cancer
Recent genome-wide analysis has shown that DNA methylation spans long stretches of chromosome regions consisting of clusters of contiguous CpG islands or gene families. Hypermethylation of various gene cluster...
-
Article
Alveolar Rhabdomyosarcoma Causing Acute Compartment Syndrome of the Forearm: A Case Report and Review of the Literature
-
Article
Genome-wide DNA methylation profiling reveals parity-associated hypermethylation of FOXA1
Early pregnancy in women by the age of 20 is known to have a profound effect on reduction of lifelong breast cancer risk as compared to their nulliparous counterparts. Additional pregnancies further enhance t...
-
Article
Open AccessEpitope analysis following active immunization with tau proteins reveals immunogens implicated in tau pathogenesis
Abnormal tau hyperphosphorylation and its accumulation into intra-neuronal neurofibrillary tangles are linked to neurodegeneration in Alzheimer’s disease and similar tauopathies. One strategy to reduce accumul...
-
Chapter and Conference Paper
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing
The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud user...