Results 101 to 110 of about 929,097 (333)
Spacecraft crew procedures from paper to computers [PDF]
Described here is a research project that uses human factors and computer systems knowledge to explore and help guide the design and creation of an effective Human-Computer Interface (HCI) for spacecraft crew procedures.
Manahan, Meera, Oneal, Michael
core +1 more source
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon +9 more
wiley +1 more source
Caliper simulation using computer for vocational and technical education
In this study a caliper simulation was developed as computer application for using in the Vocational Education and Training (VET) and Distance-based training.
Genc Garip +3 more
doaj +1 more source
Artificial neural networks for the detection of odontoid fractures using the Konstanz Information Miner Analytics Platform [PDF]
Study Design An experimental study. Purpose This study aimed to investigate the potential use of artificial neural networks (ANNs) in the detection of odontoid fractures using the Konstanz Information Miner (KNIME) Analytics Platform that provides a ...
Wongthawat Liawrungrueang +5 more
doaj +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Objective Despite their many emerging applications, practical use of brain–computer interfaces (BCIs) is often impeded by BCI-inefficiency, that is, the failure of the technology to decode neural modulations with sufficient accuracy.
Nicolas Ivanov, Tom Chau
doaj +1 more source
Lightweight Adaptation of Classifiers to Users and Contexts: Trends of the Emerging Domain
Intelligent computer applications need to adapt their behaviour to contexts and users, but conventional classifier adaptation methods require long data collection and/or training times.
Elena Vildjiounaite +3 more
doaj +1 more source
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security [PDF]
The security research community has recently recognised that user behaviour plays a part in many security failures, and it has become common to refer to users as the 'weakest link in the security chain'.
Brostoff, S, Sasse, MA, Weirich, D
core
Tumor mutational burden as a determinant of metastatic dissemination patterns
This study performed a comprehensive analysis of genomic data to elucidate whether metastasis in certain organs share genetic characteristics regardless of cancer type. No robust mutational patterns were identified across different metastatic locations and cancer types.
Eduardo Candeal +4 more
wiley +1 more source

