Results 91 to 100 of about 15,768,589 (336)

Improving a data-acquisition software system with abstract data type components [PDF]

open access: yes
data types and object-oriented design are active research areas in computer science and software engineering. Much of the interest is aimed at new software development.
Howard, S. D.
core   +1 more source

On the assimilation of SWOT type data into 2D shallow-water models [PDF]

open access: yes, 2013
In river hydraulics, assimilation of water level measurements at gauging stations is well controlled, while assimilation of images is still delicate. In the present talk, we address the richness of satellite mapped information to constrain a 2D shallow ...
Couderc, Frédéric   +5 more
core  

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Statistical Analysis Of Data Sets Legislative Type [PDF]

open access: yesRevista Română de Statistică, 2013
This paper identifies some characteristic statistical aspects of the annual legislation’s dynamics and structure in the socio-economic system that had defined Romania, over the last two decades.
Gheorghe Săvoiu, Nicolae Costake
doaj  

Missing-Values Adjustment for Mixed-Type Data

open access: yesJournal of Probability and Statistics, 2011
We propose a new method of single imputation, reconstruction, and estimation of nonreported, incorrect, implausible, or excluded values in more than one field of the record.
Agostino Tarsitano, Marianna Falcone
doaj   +1 more source

Multiple Data Type Encryption using Genetic Neural Network

open access: yesTikrit Journal of Engineering Sciences, 2010
The aim of this research is to build a ciphering system by using genetic neural network technique to protect data against unauthorized access to the data being transferred.
Raid R. Al-Nima   +2 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Target maneuver type oriented data label generation method [PDF]

open access: yesZhihui kongzhi yu fangzhen
Target maneuver type recognition is a key aspect in the fields such as object tracking and intention recognition. A multi-layer label generation method based on improved K-medoids clustering is proposed to address the problems of insufficient ...
WANG Qilin, CAO Zhimin, GAO Jing
doaj   +1 more source

Home - About - Disclaimer - Privacy