Results 81 to 90 of about 597,262 (308)

miRNA‐29 regulates epidermal and mesenchymal functions in skin repair

open access: yesFEBS Letters, EarlyView.
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan   +10 more
wiley   +1 more source

Clone Removal in Java Programs as a Process of Stepwise Unification [PDF]

open access: yes, 2013
Cloned code is one of the most important obstacles against consistent software maintenance and evolution. Although today's clone detection tools find a variety of clones, they do not offer any advice how to remove such clones.
Bremm, Andri, Speicher, Daniel
core  

Protonophore activity of short‐chain fatty acids induces their intracellular accumulation and acidification

open access: yesFEBS Letters, EarlyView.
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang   +2 more
wiley   +1 more source

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Code clone detection in obfuscated Android apps [PDF]

open access: yes, 2022
The Android operating system has long become one of the main global smartphone operating systems. Both developers and malware authors often reuse code to expedite the process of creating new apps and malware samples.
Foroughipour, Ardalan
core  

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [PDF]

open access: yesInternational Journal of Intelligent Computing and Information Sciences, 2016
Code clones is considered now an important part of improving the overall design of software structure and software maintenance through making the source code more readable and more capable for maintenance. To remove code clones from a written code, refactoring technique could be used. Copying and pasting fragments of codes is a type of code clones that
Shahenda Sarhan   +2 more
openaire   +1 more source

On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones [PDF]

open access: yesarXiv, 2021
Since IoT systems provide services over the Internet, they must continue to operate safely even if malicious users attack them. Since the computational resources of edge devices connected to the IoT are limited, lightweight platforms and network protocols are often used.
arxiv  

Oreo: Detection of Clones in the Twilight Zone [PDF]

open access: yesProceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2018) 354-365, 2018
Source code clones are categorized into four types of increasing difficulty of detection, ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors reported in the literature work well up to Type-3, which accounts for syntactic differences.
arxiv   +1 more source

Home - About - Disclaimer - Privacy