Results 131 to 140 of about 597,262 (308)

Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value

open access: yesMolecular Oncology, EarlyView.
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song   +13 more
wiley   +1 more source

Conceptual Design and Parametric Optimization of a New Multileveled Horsetail Structure for Bicycle Helmets

open access: yesAdvanced Engineering Materials, EarlyView., 2023
This study aims to explore the feasibility of using a structure inspired by the features of horsetail and human spine as the potential helmet liner, targeting at mitigation of acceleration‐induced injuries. A parametric study is conducted to investigate the effect of individual geometrical variables in the design, indicating its capability to reduce ...
Bing Leng   +3 more
wiley   +1 more source

A systematic literature review on the applications of recurrent neural networks in code clone research.

open access: yesPLoS ONE
Code clones, referring to code fragments that are either similar or identical and are copied and pasted within software systems, have negative effects on both software quality and maintenance.
Fahmi H Quradaa   +2 more
doaj   +1 more source

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App’s Manifest File

open access: yesIEEE Access, 2019
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim   +3 more
doaj   +1 more source

LVMapper: A Large-variance Clone Detector Using Sequencing Alignment Approach [PDF]

open access: yesarXiv, 2019
To detect large-variance code clones (i.e. clones with relatively more differences) in large-scale code repositories is difficult because most current tools can only detect almost identical or very similar clones. It will make promotion and changes to some software applications such as bug detection, code completion, software analysis, etc.
arxiv  

Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu   +15 more
wiley   +1 more source

Attack of the clones: an investigation into removing redundant source code [PDF]

open access: yes, 2002
Long-term maintenance of code will often lead to the introduction of duplicated or 'cloned' code. Legacy systems riddled with these clones have large amounts of redundant code and are more difficult to understand and maintain.
Bailey, John Oliver
core  

A large‐scale retrospective study in metastatic breast cancer patients using circulating tumour DNA and machine learning to predict treatment outcome and progression‐free survival

open access: yesMolecular Oncology, EarlyView.
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes   +20 more
wiley   +1 more source

Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices

open access: yesSensors
This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software.
Maxim Kalinin, Nikita Gribkov
doaj   +1 more source

Discovering Near Duplicate Text in Software Documentation

open access: yesТруды Института системного программирования РАН, 2018
Development of software documentation often involves copy-pasting, which produces a lot of duplicate text. Such duplicates make it difficult and expensive documentation maintenance, especially in case of long life cycle of software and its documentation.
L. D. Kanteev   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy