Results 131 to 140 of about 597,262 (308)
Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song+13 more
wiley +1 more source
This study aims to explore the feasibility of using a structure inspired by the features of horsetail and human spine as the potential helmet liner, targeting at mitigation of acceleration‐induced injuries. A parametric study is conducted to investigate the effect of individual geometrical variables in the design, indicating its capability to reduce ...
Bing Leng+3 more
wiley +1 more source
Code clones, referring to code fragments that are either similar or identical and are copied and pasted within software systems, have negative effects on both software quality and maintenance.
Fahmi H Quradaa+2 more
doaj +1 more source
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim+3 more
doaj +1 more source
LVMapper: A Large-variance Clone Detector Using Sequencing Alignment Approach [PDF]
To detect large-variance code clones (i.e. clones with relatively more differences) in large-scale code repositories is difficult because most current tools can only detect almost identical or very similar clones. It will make promotion and changes to some software applications such as bug detection, code completion, software analysis, etc.
arxiv
Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu+15 more
wiley +1 more source
Attack of the clones: an investigation into removing redundant source code [PDF]
Long-term maintenance of code will often lead to the introduction of duplicated or 'cloned' code. Legacy systems riddled with these clones have large amounts of redundant code and are more difficult to understand and maintain.
Bailey, John Oliver
core
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes+20 more
wiley +1 more source
Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software.
Maxim Kalinin, Nikita Gribkov
doaj +1 more source
Discovering Near Duplicate Text in Software Documentation
Development of software documentation often involves copy-pasting, which produces a lot of duplicate text. Such duplicates make it difficult and expensive documentation maintenance, especially in case of long life cycle of software and its documentation.
L. D. Kanteev+4 more
doaj +1 more source