Results 61 to 70 of about 2,264,107 (292)

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

Hybrid automated reliability predictor integrated work station (HiREL) [PDF]

open access: yes
The Hybrid Automated Reliability Predictor (HARP) integrated reliability (HiREL) workstation tool system marks another step toward the goal of producing a totally integrated computer aided design (CAD) workstation design capability.
Bavuso, Salvatore J.
core   +1 more source

Analysis of Dynamic Behaviour and Power Generation of a Wind-tidal System for Marine Environment [PDF]

open access: yes, 2012
This work presents the analysis of dynamic behaviour and power generation of a wind-tidal hybrid system. Mathematical models and system design approach were used to investigate the feasibility, reliability and economic impact of the system.
Ogbemhe, J.A.   +2 more
core  

Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes

open access: yesFEBS Open Bio, EarlyView.
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde   +3 more
wiley   +1 more source

Synthesizing SystemC Code from Delay Hybrid CSP

open access: yes, 2017
Delay is omnipresent in modern control systems, which can prompt oscillations and may cause deterioration of control performance, invalidate both stability and safety properties.
A Bellen   +18 more
core   +1 more source

Smart working paradigms in a hybrid working era

open access: yesEuropean Conference on Knowledge Management, 2022
If we observe top companies in any industry, we notice they have one thing in common: innovation.  Successful business leaders recognize when the same ideas and methods used before aren’t working anymore. Smart, innovative approaches are needed for our hybrid working environment. The ABCD business model shows that present organizations spend the ...
openaire   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Adopting Scrum in Hybrid Settings, in a University Course Project: Reflections and Recommendations

open access: yesIEEE Access
Agile software development (ASD) methods such as Scrum promote collocated team collaboration. However, adopting Scrum in hybrid work environments can pose challenges.
Woubshet Behutiye   +2 more
doaj   +1 more source

The role of transformational leadership, work-life balance, and employee engagement on Gen Z’s organizational commitment in the Indonesian creative industry [PDF]

open access: yesProblems and Perspectives in Management
Adapting retention strategies is essential to balancing Generation Z’s unique work values and preferences so that organizations can reduce turnover, enhance loyalty, and thrive in hybrid work environments.
Janitia Amirah Jasmine, Prio Utomo
doaj   +1 more source

Hybrid Information Flow Analysis for Programs with Arrays

open access: yes, 2016
Information flow analysis checks whether certain pieces of (confidential) data may affect the results of computations in unwanted ways and thus leak information.
Barany, Gergö
core   +4 more sources

Home - About - Disclaimer - Privacy