Results 141 to 150 of about 3,299,091 (308)

USE OF INFORMATION – COMMUNICATIVE TECHNOLOGIES IN ADMINISTRATIVE ACTIVITY OF THE GENERAL EDUCATION ESTABLISHMENT

open access: yesІнформаційні технології і засоби навчання, 2010
The paper deals with up-to-date questions concerning the effective introduction of the newest information technologies, system complexes and computer programs into management of general education establishment.
Zoya V. Savchenko
doaj  

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

N-body U and K matrix program [PDF]

open access: yes, 1973
Computer program was devised to compute free-fall trajectories of satellites, allowing for injection errors and midcourse velocity perturbations. Program consists of trajectory perturbing program and N-body integrating conic program which can also be ...
Hoeft, R. F., Ojeda, L., Setter, R. N.
core   +1 more source

Dimethyl fumarate combined with cisplatin at subcytotoxic doses sensitizes cervical cancer toward ferroptosis and apoptosis through GSH restriction and p53 (re)activation

open access: yesMolecular Oncology, EarlyView.
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano   +6 more
wiley   +1 more source

Computer programs as accounting object

open access: yesVìsnik Žitomirsʹkogo Deržavnogo Tehnologìčnogo Unìversitetu: Ekonomìčnì Nauki, 2015
Existing approaches to the regulation of accounting software as one of the types of intangible assets have been considered. The features and current state of the legal protection of computer programs have been analyzed.
I.V. Perviy
doaj  

Automated documentation of an assembly program [PDF]

open access: yes, 1970
A program is discussed that can be used as input to another program which will automatically document it. This program was implemented using assembly language program, META-SYMBOL, on XDS 930 computer.
Thomas, V. L.
core   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Computer program documentation - SYSTID, system time-domain simulation program [PDF]

open access: yes
SYSTID computer program for system time-domain simulation program in FORTRAN 5 for Univac 1108 ...
Fashano, M., Freeman, E.
core   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy