Results 81 to 90 of about 1,655,249 (351)

Mechanisms and kinetic assays of aminoacyl‐tRNA synthetases

open access: yes
FEBS Letters, EarlyView.
Igor Zivkovic   +2 more
wiley   +1 more source

Cell‐free DNA aneuploidy score as a dynamic early response marker in prostate cancer

open access: yesMolecular Oncology, EarlyView.
mFast‐SeqS‐based genome‐wide aneuploidy scores are concordant with aneuploidy scores obtained by whole genome sequencing from tumor tissue and can predict response to ARSI treatment at baseline and, at an early time point, to ARSI and taxanes. This assay can be easily performed at low cost and requires little input of cfDNA. Cell‐free circulating tumor
Khrystany T. Isebia   +17 more
wiley   +1 more source

Highly multiplexed digital PCR assay for simultaneous quantification of variant allele frequencies and copy number alterations of KRAS and GNAS in pancreatic cancer precursors

open access: yesMolecular Oncology, EarlyView.
Combining melting curve analysis enhances the multiplexing capability of digital PCR. Here, we developed a 14‐plex assay to simultaneously measure single nucleotide mutations and amplifications of KRAS and GNAS, which are common driver genes in pancreatic cancer precursors. This assay accurately quantified variant allele frequencies in clinical samples
Junko Tanaka   +10 more
wiley   +1 more source

Dissecting Genotype by Environment Interactions in Moroccan Wheat: An Advanced Biplot and Heatmap Analysis Unveiling Agronomic, Quality Traits, and Genotypic Stability for Tailored Breeding Strategies

open access: yesPlants
This five-year study (2016–2021) across diverse Moroccan agro-climatic zones investigated genotype by environment (G × E) interactions in wheat, focusing on variations in agronomic traits and quality attributes such as protein and gluten content ...
Oussama Hnizil   +5 more
doaj   +1 more source

GENESIM : genetic extraction of a single, interpretable model [PDF]

open access: yes, 2016
Models obtained by decision tree induction techniques excel in being interpretable.However, they can be prone to overfitting, which results in a low predictive performance. Ensemble techniques are able to achieve a higher accuracy. However, this comes at
De Turck, Filip   +4 more
core   +2 more sources

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Genetic engineering possibilities for CELSS: A bibliography and summary of techniques [PDF]

open access: yes
A bibliography of the most useful techniques employed in genetic engineering of higher plants, bacteria associated with plants, and plant cell cultures is provided. A resume of state-of-the-art genetic engineering of plants and bacteria is presented. The
Johnson, E. J.
core   +1 more source

A sensitive genetic-based detection capability for Didymosphenia geminata [PDF]

open access: yes, 2006
It is now well recognized that the increase in global transportation over the last two decades has brought with it an increased potential for the introduction of unwanted microorganisms (aquatic or terrestrial) that may have drastic effects on human and ...
Cary, S. Craig   +3 more
core   +1 more source

DNA-Genetic Encryption Technique [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2016
In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable. In this technique, binaries any type of digital data and convert it to DNA sequencing, reshape, encrypt, crossover, mutate and then reshape. The main stages of D-GET are repeated three times or more. Transmit the encrypted
openaire   +2 more sources

Home - About - Disclaimer - Privacy