Results 51 to 60 of about 1,095,836 (281)

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

On the inverse M-matrix problem for (0,1)-matrices

open access: yesLinear Algebra and its Applications, 1980
AbstractA graph-theoretic approach is used to characterize (0,1)-matrices which are inverses of M-matrices. Our main results show that a (0,1)-matrix is an inverse of an M-matrix if and only if its graph induces a partial order on its set of vertices and does not contain a certain specific subgraph.
Lewin, Mordechai, Neumann, Michael
openaire   +1 more source

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

Inverse matrices with applications in public-key cryptography

open access: yesJournal of Algorithms & Computational Technology
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui   +1 more
doaj   +1 more source

On correspondence between tensors and bispinors

open access: yes, 2001
It is known that in the four-dimensional Riemannian space the complex bispinor generates a number of tensors: scalar, pseudo-scalar, vector, pseudo-vector, antisymmetric tensor.
Gorbatenko, M. V., Pushkin, A. V.
core   +1 more source

M-Matrix Inverse problem for distance-regular graphs

open access: yes, 2010
We analyze when the Moore–Penrose inverse of the combinatorial Laplacian of a distance–regular graph is a M–matrix;that is, it has non–positive off–diagonal elements or, equivalently when the Moore-Penrose inverse of the combinatorial Laplacian of a distance–regular graph is also the combinatorial Laplacian of another network.
Bendito Pérez, Enrique   +3 more
openaire   +3 more sources

Cyclic azapeptide CD36 ligand attenuates cardiac injury and reduces long‐chain fatty acid accumulation after myocardial ischemia–reperfusion in mice

open access: yesFEBS Open Bio, EarlyView.
In a murine model of myocardial ischemia and reperfusion (MI/R), the CD36 azapeptide ligand MPE‐298 reduces cardiac injury and transiently lowers left ventricular long‐chain fatty acids (LCFAs) accumulation 3 h after reperfusion, accompanied by a decrease of oxidative stress and inflammation‐associated genes' expression in the heart and adipose tissue.
Jade Gauvin   +12 more
wiley   +1 more source

Some Results for the Drazin Inverses of the Sum of Two Matrices and Some Block Matrices

open access: yesJournal of Applied Mathematics, 2013
We give a formula of (P+Q)D under the conditions P2Q+QPQ=0, P3Q=0, and PQPQ=0. Then, we apply it to give some expressions for the Drazin inverse of block matrix M=(ABCD) (A and D are square matrices) under some conditions, generalizing some recent ...
Abdul Shakoor, Hu Yang, Ilyas Ali
doaj   +1 more source

Performance Analysis of Trust Region Subproblem Solvers for Limited-Memory Distributed BFGS Optimization Method

open access: yesFrontiers in Applied Mathematics and Statistics, 2021
The limited-memory Broyden–Fletcher–Goldfarb–Shanno (L-BFGS) optimization method performs very efficiently for large-scale problems. A trust region search method generally performs more efficiently and robustly than a line search method, especially when ...
Guohua Gao   +5 more
doaj   +1 more source

Hua type integrals over unitary groups and over projective limits of unitary groups

open access: yes, 2001
We discuss some natural maps from a unitary group U(n) to a smaller group U(n-m) (these maps are versions of the Livshic characteristic function). We calculate explicitly the direct images of the Haar measure under some maps.
Neretin, Yurii A.
core   +3 more sources

Home - About - Disclaimer - Privacy