Nanotechnology for pain management: Current and future therapeutic interventions
Pain is one of the most common medical conditions and affects more Americans than
diabetes, heart disease, and cancer combined. Current pain treatments mainly rely on opioid …
diabetes, heart disease, and cancer combined. Current pain treatments mainly rely on opioid …
Targeting proinflammatory molecules using multifunctional MnO nanoparticles to inhibit breast cancer recurrence and metastasis
Photothermal therapy (PTT) is an effective treatment modality that is highly selective for
tumor suppression and is a hopeful alternative to traditional cancer therapy. However, PTT-…
tumor suppression and is a hopeful alternative to traditional cancer therapy. However, PTT-…
Therapeutic Nanocarriers Inhibit Chemotherapy‐Induced Breast Cancer Metastasis
…, LE Valencia Salazar, D Bhansali… - Advanced …, 2022 - Wiley Online Library
Chemotherapy, although effective against primary tumors, may promote metastasis by causing
the release of proinflammatory factors from damaged cells. Here, polymeric nanoparticles …
the release of proinflammatory factors from damaged cells. Here, polymeric nanoparticles …
Discovering features for detecting malicious websites: An empirical study
J McGahagan IV, D Bhansali, C Pinto-Coelho… - Computers & …, 2021 - Elsevier
Website features and characteristics have shown the ability to detect various web threats –
phishing, drive-by downloads, and command and control (C2). Prior research has thoroughly …
phishing, drive-by downloads, and command and control (C2). Prior research has thoroughly …
[PDF][PDF] An optimistic differentiated job scheduling system for cloud computing
S Ambike, D Bhansali, J Kshirsagar… - International Journal of …, 2012 - Citeseer
Job scheduling is one of the major activities performed in all the computing environments.
Cloud computing is one the upcoming latest technology which is developing drastically. To …
Cloud computing is one the upcoming latest technology which is developing drastically. To …
A comprehensive evaluation of webpage content features for detecting malicious websites
J McGahagan, D Bhansali… - 2019 9th Latin …, 2019 - ieeexplore.ieee.org
Security researchers have used features gathered from webpage content (both HTML and
JavaScript) to detect malicious websites. Although webpage content features have shown …
JavaScript) to detect malicious websites. Although webpage content features have shown …
Is it necessary to repeat critical values in the laboratory? Today's technology may have the answers
HS Chima, V Ramarajan, D Bhansali - Laboratory Medicine, 2009 - academic.oup.com
Repeating a test for accuracy is a well-established practice in laboratories. In the early days
of laboratory instrumentation, this was appropriate, since instruments had poor precision …
of laboratory instrumentation, this was appropriate, since instruments had poor precision …
Differentiating benign from malignant bone marrow B-cell lymphoid aggregates: a statistical analysis of distinguishing features
…, K Naemi, N Reisian, D Bhansali… - … of Pathology and …, 2015 - meridian.allenpress.com
Context Lymphoid aggregates are seen in a minority of bone marrow biopsy specimens, and
when present, their neoplastic nature is often apparent by morphologic evaluation. However…
when present, their neoplastic nature is often apparent by morphologic evaluation. However…
Identifying infected users via network traffic
… The authors used eight hours of NetFlow records to profile five users on a large metropolitan
WiFi network with a total of 200,000 users and an average of 1000 users NAT’ d behind two …
WiFi network with a total of 200,000 users and an average of 1000 users NAT’ d behind two …
A comprehensive evaluation of HTTP header features for detecting malicious websites
J McGahagan, D Bhansali, M Gratian… - 2019 15th European …, 2019 - ieeexplore.ieee.org
Security researchers have used website features including the URL, webpage content, HTTP
headers, and others to detect malicious websites. In prior research, features derived from …
headers, and others to detect malicious websites. In prior research, features derived from …