Showing 161 - 180 results of 2,564 for search 'mononym~', query time: 4.67s Refine Results
  1. 161

    Association of Peripheral Monocyte Count with Soluble P-Selectin and Advanced Stages in Nasopharyngeal Carcinoma by Adi Surya Komala, Andhika Rachman

    Published 2018-01-01
    “…Monocyte count was correlated with sP-selectin especially in high monocyte count subgroup.…”
    Get full text
    Article
  2. 162

    Effect of cyclosporin A on inflammatory cytokine production by U937 monocyte-like cells by Juan E. Losa Garcia, María Rosa Martín de Cabo, Fernando Mateos Rodríguez, Jesús Pérez Losada, Antonio Jiménez López, José Luis Pérez Arellano

    Published 2000-01-01
    “…The present study was undertaken to determine the effect of CsA on inflammatory cytokine secretion by U937 monocyte cells. Undifferentiated and dimethylsulfoxide (DMSO) differentiated U937 cells were incubated with different concentrations of CsA (200, 20 and 2 ng/mL) in the presence or absence of phorbol-myristateacetate (PMA). …”
    Get full text
    Article
  3. 163

    The Role of the Monocyte-to-Lymphocyte Ratio in Acute Ischemic Stroke Patients with Acute Kidney Injury by Fen Jiang, Zhen Shi, Xiangyang Liu, Jiaxuan Xiang, Jie Lei, Bo Yang, XiangLi Lei, Xuewei Li

    Published 2022-01-01
    “…The objective of the study was to determine if acute kidney injury (AKI) in patients with acute ischemic stroke was associated with the monocyte-to-lymphocyte ratio (MLR) assessed upon admission to the neurology intensive care unit (NICU) (AIS). …”
    Get full text
    Article
  4. 164
  5. 165

    Monocyte STAT1 phosphorylation and treatment response of JAK inhibitors in chronic nonbacterial osteomyelitis by Motoshi Sonoda, Keishiro Kinoshita, Nobutaka Harada, Sungyeon Park, Shunichi Adachi, Yutaro Yada, Katsuhide Eguchi, Toshifumi Fujiwara, Makiko Kido-Nakahara, Noriko Kinjo, Masataka Ishimura, Shouichi Ohga

    Published 2025-01-01
    “…Notably, pSTAT1 levels in CNO monocytes fluctuated with disease activity, decreasing in 5 patients during clinical remission following conventional therapies (p = 0.016). …”
    Get full text
    Article
  6. 166

    Olopatadine Suppresses the Migration of THP-1 Monocytes Induced by S100A12 Protein by Kazuya Kishimoto, Satoshi Kaneko, Kenji Ohmori, Tadafumi Tamura, Kazuhide Hasegawa

    Published 2006-01-01
    “…Pretreatment of olopatadine with S100A12 reduced migration of THP-1, a monocyte cell line, induced by S100A12 alone, but did not affect recombinant human regulated upon activation, normal T cell expressed and secreted (RANTES)-induced migration. …”
    Get full text
    Article
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172

    Evaluation of Monomer Releasing from Dentin Replacement Materials by Nurgül Çetin Tuncer, Sevde Gül Batmaz, Sergen Özdemir, Çağatay Barutçugil, Ayşe Dündar, Kardelen Yıldırım

    Published 2024-01-01
    “…The aim of this study is to determine and quantify the monomer elution from four different resin-based composite dentin replacement materials for 3 months using HPLC. …”
    Get full text
    Article
  13. 173

    Secure password-based authentication scheme with anonymous identity without smart cards by WANG Bang-ju1, ZHANG Huan-guo1, WANG Yu-hua3

    Published 2008-01-01
    “…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
    Get full text
    Article
  14. 174
  15. 175

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…Anonymity is an important concern in wireless communications. …”
    Get full text
    Article
  16. 176
  17. 177

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required. Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city. …”
    Get full text
    Article
  18. 178

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…In practical application scenarios, it is essential to not only protect the privacy of user identities but also to effectively regulate anonymous identities. An anonymous and supervisable cross-data center identity authentication scheme based on blockchain was proposed. …”
    Get full text
    Article
  19. 179
  20. 180

    Anonymity handover authentication protocol based on group signature for wireless Mesh network by Bin-ting SU, Li XU, Feng WANG, NZhi-xing LI

    Published 2016-10-01
    “…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
    Get full text
    Article