Results 41 to 50 of about 10,120 (319)

Cooperative Path Planning for Multiplayer Reach‐Avoid Games under Imperfect Observation Information

open access: yesAdvanced Intelligent Systems
This article investigates a reach‐avoid game and proposes a cooperative path planning algorithm for a target–pursuers (TP) coalition to capture an evader.
Hongwei Fang, Yue Chen, Peng Yi
doaj   +1 more source

A Sequential Game Framework for Target Tracking

open access: yesIEEE Access
This paper investigates the application of game-theoretic principles combined with advanced Kalman filtering techniques to enhance maritime target tracking systems.
Daniel Leal   +4 more
doaj   +1 more source

Pursuit on a Graph Using Partial Information [PDF]

open access: yes, 2014
The optimal control of a "blind" pursuer searching for an evader moving on a road network and heading at a known speed toward a set of goal vertices is considered.
Casbeer, D.   +3 more
core  

Evading apoptosis in cancer [PDF]

open access: yesTrends in Cell Biology, 2013
Carcinogenesis is a mechanistically complex and variable process with a plethora of underlying genetic causes. Cancer development comprises a multitude of steps that occur progressively starting with initial driver mutations leading to tumorigenesis and, ultimately, metastasis.
Kaleigh, Fernald, Manabu, Kurokawa
openaire   +2 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Two Hierarchical Guidance Laws of Pursuer in Orbital Pursuit–Evasion–Defense Game

open access: yesAerospace, 2023
In this study, differential game theory was applied to propose two guidance laws of a pursuer in an orbit pursuit–evasion–defense game. One was a conservative guidance law of maneuvering to absolute safety before pursuing the evader, and the other was a ...
Yongshang Wei   +4 more
doaj   +1 more source

An improved lion strategy for the lion and man problem

open access: yes, 2017
In this paper, a novel lion strategy for David Gale's lion and man problem is proposed. The devised approach enhances a popular strategy proposed by Sgall, which relies on the computation of a suitable "center".
Casini, Marco, Garulli, Andrea
core   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Adapting Search Theory to Networks [PDF]

open access: yes, 2001
The CSE is interested in the general problem of locating objects in networks. Because of their exposure to search theory, the problem they brought to the workshop was phrased in terms of adapting search theory to networks.
Alspach, Brian
core  

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy