Results 91 to 100 of about 7,984,444 (369)
Analysis of error processes in computer software [PDF]
Norman F. Schneidewind
openalex +3 more sources
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. This paper addresses the general events of
Suman Bhunia+4 more
doaj +1 more source
Teaching rule‐based algorithmic composition: the PWGL library cluster rules [PDF]
This paper presents software suitable for undergraduate students to implement computer programs that compose music. The software offers a low floor (students easily get started) but also a high ceiling (complex compositional theories can be modelled ...
Anders, Torsten
core
Combining melting curve analysis enhances the multiplexing capability of digital PCR. Here, we developed a 14‐plex assay to simultaneously measure single nucleotide mutations and amplifications of KRAS and GNAS, which are common driver genes in pancreatic cancer precursors. This assay accurately quantified variant allele frequencies in clinical samples
Junko Tanaka+10 more
wiley +1 more source
Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu+15 more
wiley +1 more source
Identification of Illegal Outdoor Advertisements Based on CLIP Fine-Tuning and OCR Technology
Recognizing unauthorized outdoor advertising is important for a city’s visual appeal, organizational structure, and adherence to regulations. This paper aims to solve the problem that traditional models are difficult to accurately identify illegal
Haiyan Zhang+8 more
doaj +1 more source
Non-developmental item computer systems and the malicious software threat [PDF]
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software ...
Bown, Rodney L.
core +1 more source
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair+17 more
wiley +1 more source
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes+20 more
wiley +1 more source