Results 101 to 110 of about 1,135,516 (291)

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer

open access: yesMolecular Oncology, EarlyView.
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan   +16 more
wiley   +1 more source

Formal REA model at operational level [PDF]

open access: yes
Despite a lot of attention gained by the Resource-Event-Agent (REA) framework among researchers in enterprise modeling, it still lacks comprehensive formal description.
Ito, Sohei, Vymetal, Dominik
core   +1 more source

Cell‐cycle‐specific lesion evolution rather than inhibition of double‐strand‐break repair underpins cisplatin radiosensitization

open access: yesMolecular Oncology, EarlyView.
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu   +10 more
wiley   +1 more source

Formal modeling and control of cyber-physical manufacturing systems

open access: yesAdvances in Mechanical Engineering, 2017
Cyber-physical manufacturing systems are a new paradigm of manufacturing systems that integrate cyber systems and physical systems to aid smart manufacturing.
Zhenhua Yu   +3 more
doaj   +1 more source

Transcriptional profiling of circulating extracellular vesicles from prebiopsy prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner   +14 more
wiley   +1 more source

S5-4: Formal Modeling of Affordance in Human-Included Systems

open access: yesi-Perception, 2012
In spite of it being necessary for humans to consider modeling, analysis, and control of human-included systems, it has been considered a challenging problem because of the critical role of humans in complex systems and of humans' capability of executing
Namhun Kim
doaj   +1 more source

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

Model evolution and system evolution

open access: yesJournal of Computer Science and Technology, 2000
In this paper we define an evolution mechanism with formal semantics using the metamodeling methodology [Geisler et al.98] based on dynamic logic. A remarkable feature of the metamodeling methodology is the ability to define the relation of intentional ...
Claudia Pons   +2 more
doaj  

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM

open access: yesScientific Reports
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy