Results 51 to 60 of about 3,204,038 (351)

Incremental Database Design using UML-B and Event-B [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2018
Correct operation of many critical systems is dependent on the data consistency and integrity properties of underlying databases. Therefore, a verifiable and rigorous database design process is highly desirable.
Ahmed Al-Brashdi   +2 more
doaj   +1 more source

Order-Preserving Database Encryption with Secret Sharing [PDF]

open access: yesarXiv, 2023
The order-preserving encryption (OPE) problem was initially formulated by the database community in 2004 soon after the paradigm database-as-a-service (DaaS) was coined in 2002. Over the past two decades, OPE has drawn tremendous research interest from communities of databases, cryptography, and security; we have witnessed significant advances in OPE ...
arxiv  

An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency [PDF]

open access: yesInternational Journal of Computer Trends and Technology (IJCTT) V9(1):1-3, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group, 2014
Fuzziness in databases is used to denote uncertain or incomplete data. Relational Databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach designed for traditional relational databases.
arxiv   +1 more source

Data Driven Surrogate Based Optimization in the Problem Solving Environment WBCSim [PDF]

open access: yes, 2009
Large scale, multidisciplinary, engineering designs are always difficult due to the complexity and dimensionality of these problems. Direct coupling between the analysis codes and the optimization routines can be prohibitively time consuming due to the ...
Deshpande, S.   +4 more
core   +3 more sources

Crosstalk between gut microbiota and tumor: tumors could cause gut dysbiosis and metabolic imbalance

open access: yesMolecular Oncology, EarlyView.
In this research, we analyzed the relationship between gut microbiota and tumor. We discovered that both subcutaneous and metastatic tumors would alter the composition and metabolic function of gut microbiota. Meanwhile, fecal microbiota transplantation also indicated the anti‐tumor role of the gut microbiota, revealing the crosstalk between tumor and ...
Siyuan Zhang   +8 more
wiley   +1 more source

B mu G@Sbase-a microbial gene expression and comparative genomic database [PDF]

open access: yes, 2011
The reducing cost of high-throughput functional genomic technologies is creating a deluge of high volume, complex data, placing the burden on bioinformatics resources and tool development. The Bacterial Microarray Group at St George's (BμG@S) has been at
Brooks, LA   +8 more
core   +2 more sources

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

MET variants with activating N‐lobe mutations identified in hereditary papillary renal cell carcinomas still require ligand stimulation

open access: yesMolecular Oncology, EarlyView.
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin   +14 more
wiley   +1 more source

Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems

open access: yesActa Polytechnica, 2001
Supporting integrity constraints is essential for database systems. Integrity constraints are used to ensure that the data in a database complies with rules that have been set to establish accurate and acceptable information for a database.
M. Badawy, K. Richta
doaj  

Time-course transcriptome data of silk glands in day 0–7 last-instar larvae of Bombyx mori (w1 pnd strain)

open access: yesScientific Data
Time-course transcriptome expression data were constructed for four parts of the silk gland (anterior, middle, and posterior parts of the middle silk gland, along with the posterior silk gland) in the domestic silkworm, Bombyx mori, from days 0 to 7 of ...
Yudai Masuoka   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy