Results 91 to 100 of about 9,715,830 (339)

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Microkinetics of alcohol reforming for H2 production from a FAIR density functional theory database

open access: yesNature Communications, 2018
The production of hydrogen from biomass is of fundamental importance for a sustainable future. Here, the authors present a multiscale method that allows the formulation of scaling relationships and microkinetics of C1-C2 alcohol decomposition based on a ...
Qiang Li   +2 more
doaj   +1 more source

CDK11 inhibition induces cytoplasmic p21WAF1 splice variant by p53 stabilisation and SF3B1 inactivation

open access: yesMolecular Oncology, EarlyView.
CDK11 inhibition stabilises the tumour suppressor p53 and triggers the production of an alternative p21WAF1 splice variant p21L, through the inactivation of the spliceosomal protein SF3B1. Unlike the canonical p21WAF1 protein, p21L is localised in the cytoplasm and has reduced cell cycle‐blocking activity.
Radovan Krejcir   +12 more
wiley   +1 more source

Extending the relational model with uncertainty and ignorance [PDF]

open access: yes, 2004
It has been widely recognized that in many real-life database applications there is growing demand to model uncertainty and ignorance. However the relational model does not provide this possibility.
Blok, Henk Ernst   +2 more
core   +1 more source

Cytoplasmic p21 promotes stemness of colon cancer cells via activation of the NFκB pathway

open access: yesMolecular Oncology, EarlyView.
Cytoplasmic p21 promotes colorectal cancer stem cell (CSC) features by destabilizing the NFκB–IκB complex, activating NFκB signaling, and upregulating BCL‐xL and COX2. In contrast to nuclear p21, cytoplasmic p21 enhances spheroid formation and stemness transcription factor CD133.
Arnatchai Maiuthed   +10 more
wiley   +1 more source

Color-Based Image Retrieval Using Proximity Space Theory

open access: yesAlgorithms, 2018
The goal of object retrieval is to rank a set of images by their similarity compared with a query image. Nowadays, content-based image retrieval is a hot research topic, and color features play an important role in this procedure.
Jing Wang   +4 more
doaj   +1 more source

Stark Broadening of several Ar I Spectral Lines in the Visible Part of the Spectrum

open access: yes, 2011
In order to complete data on Stark broadening parameters for Ar I line in the visible spectrum, we determined Stark widths and shifts due to electron, proton, and ionized helium impacts, for nine lines (4191.0, 4259.4, 5912.1, 6043.2, 6045.0, 6752.9 ...
Bashkin   +5 more
core   +2 more sources

Class IIa HDACs forced degradation allows resensitization of oxaliplatin‐resistant FBXW7‐mutated colorectal cancer

open access: yesMolecular Oncology, EarlyView.
HDAC4 is degraded by the E3 ligase FBXW7. In colorectal cancer, FBXW7 mutations prevent HDAC4 degradation, leading to oxaliplatin resistance. Forced degradation of HDAC4 using a PROTAC compound restores drug sensitivity by resetting the super‐enhancer landscape, reprogramming the epigenetic state of FBXW7‐mutated cells to resemble oxaliplatin ...
Vanessa Tolotto   +13 more
wiley   +1 more source

An Overview of Data Models of Object-Oriented DBMSs

open access: yesТруды Института системного программирования РАН, 2018
Object-oriented DBMS theory is one of the most prospective areas of modern database theory, along with deductive and temporal DBMS. Nevertheless, a high variety of different approaches and absence of a uniform standard, both in theoretical OODBMS area ...
A. M. Eldarkhanov
doaj  

Efficient Database Generation for Data-driven Security Assessment of Power Systems

open access: yes, 2019
Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the ...
Chatzivasileiadis, Spyros   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy