Results 81 to 90 of about 714,042 (275)

KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer

open access: yesMolecular Oncology, EarlyView.
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan   +16 more
wiley   +1 more source

A Fusion Positioning System Based on Camera and LiDAR for Unmanned Rollers in Tunnel Construction

open access: yesSensors
As an important vehicle in road construction, the unmanned roller is rapidly advancing in its autonomous compaction capabilities. To overcome the challenges of GNSS positioning failure during tunnel construction and diminished visual positioning accuracy
Hao Huang, Yongbiao Hu, Xuebin Wang
doaj   +1 more source

Expander Graph and Communication-Efficient Decentralized Optimization

open access: yes, 2016
In this paper, we discuss how to design the graph topology to reduce the communication complexity of certain algorithms for decentralized optimization. Our goal is to minimize the total communication needed to achieve a prescribed accuracy.
Chow, Yat-Tin   +3 more
core   +1 more source

Optimizing weakly triangulated graphs [PDF]

open access: yesGraphs and Combinatorics, 1989
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ryan Hayward   +2 more
openaire   +1 more source

Longitudinal circulating tumor DNA profiling in patients with advanced endometrial cancer using an off‐the‐shelf targeted NGS panel

open access: yesMolecular Oncology, EarlyView.
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena   +15 more
wiley   +1 more source

A Hybrid Transformer–Graph Framework for Curriculum Sequencing and Prerequisite Optimization in Computer Science Education with Explainable AI

open access: yesAlgorithms
Curriculum redesign in Computer Science and Information Technology has become increasingly complex due to rapid technological advancements, interdisciplinary knowledge requirements, and evolving industry expectations.
Ritika Awasthi   +4 more
doaj   +1 more source

On Graph Stream Clustering with Side Information

open access: yes, 2013
Graph clustering becomes an important problem due to emerging applications involving the web, social networks and bio-informatics. Recently, many such applications generate data in the form of streams.
Yu, Philip S., Zhao, Yuchen
core   +1 more source

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

SIMSF: A Scale Insensitive Multi-Sensor Fusion Framework for Unmanned Aerial Vehicles Based on Graph Optimization

open access: yesIEEE Access, 2020
Given the payload limitation of unmanned aerial vehicles (UAVs), lightweight sensors such as camera, inertial measurement unit (IMU), and GPS, are ideal onboard measurement devices.
Bo Dai   +5 more
doaj   +1 more source

Optimal K-secure graphs

open access: yesDiscrete Applied Mathematics, 1980
AbstractWe wish to design a resistance movement in such a way that k subversions and the resulting betrayals do not totally destroy our network. Such graphs will be called k-secure. Subject to this restriction we determine which graphs minimize the expected number of betrayals.
Georg Gunther, Bert L. Hartnell
openaire   +2 more sources

Home - About - Disclaimer - Privacy