Results 21 to 30 of about 230,052 (302)

COGENT programming manual [PDF]

open access: yes, 1969
COGENT /COmpiler and GENeralized Translator/ programming system is a compiler whose input language enables a description of symbolic and linguistic manipulation algorithms.
Reynolds, J. C.
core   +1 more source

Integrated genomic and proteomic profiling reveals insights into chemoradiation resistance in cervical cancer

open access: yesMolecular Oncology, EarlyView.
A comprehensive genomic and proteomic analysis of cervical cancer revealed STK11 and STX3 as a potential biomarkers of chemoradiation resistance. Our study demonstrated EGFR as a therapeutic target, paving the way for precision strategies to overcome treatment failure and the DNA repair pathway as a critical mechanism of resistance.
Janani Sambath   +13 more
wiley   +1 more source

Power Usage Monitoring Simulator for Estimating Usage Tariffs and Carbon Emission Levels at STO Bogor Based on IoT

open access: yesCompiler
In this modern era, the efficiency of electricity usage has become one of the main concerns in the efforts toward sustainable energy management. The limitations in monitoring electricity usage have become a challenge for technicians, resulting in ...
Nurwijayanti Kusumaningrum, Rizky Syafdi
doaj   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Optimising Bcrypt Parameters: Finding the Optimal Number of Rounds for Enhanced Security and Performance

open access: yesCompiler
Recent advancements in the field of information security have underscored the imperative to fine-tune Bcrypt parameters, particularly focusing on the optimal number of rounds as the objective of research.
Indra Listiawan   +3 more
doaj   +1 more source

The Development of Website Based Jobdesk Document Management System using Agile Method at PT. Pupuk Kujang

open access: yesCompiler, 2023
Ineffective storage and not recorded neatly are the reasons for making this system. Taking the name Jobdesk itself was chosen because it is a system that aims to make it easier for employees to send Jobdesk document information and can help the input ...
Yenni Fatman   +2 more
doaj   +1 more source

Reduced vascular leakage correlates with breast carcinoma T regulatory cell infiltration but not with metastatic propensity

open access: yesMolecular Oncology, EarlyView.
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He   +8 more
wiley   +1 more source

Impact of Wolf Thresholding on Background Subtraction for Human Motion Detection

open access: yesCompiler
Series of motion detection based on background subtraction there is an image segmentation stage. Thresholding is a common technique used for the segmentation process. There are two types that can be used in thresholding techniques namely local and global.
Elindra Ambar Pambudi   +1 more
doaj   +1 more source

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

An IoT-Based Motorcycle Security System Using Arduino and Android for Theft Prevention

open access: yesCompiler
Motorcycle theft remains a prevalent issue, especially in urban areas, where traditional security measures such as mechanical locks and ignition keys are easily bypassed. This research presents an IoT-based motorcycle security system integrating Arduino,
Aris Rakhmadi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy