Results 81 to 90 of about 312,403 (279)
This protocol paper outlines methods to establish the success of a time‐resolved serial crystallographic experiment, by means of statistical analysis of timepoint data in reciprocal space and models in real space. We show how to amplify the signal from excited states to visualise structural changes in successful experiments.
Jake Hill +4 more
wiley +1 more source
Matrix metalloproteinase‐9 (MMP9) drives ovarian cancer progression. Using MMP9‐null cells (M9‐KO) created from ovarian cancer cells, we found MMP9 loss did not block Epidermal Growth Factor (EGF)‐driven E‐cadherin dissolution or EMT but delayed and reduced EGF‐driven membrane protrusions. Transient MMP9 re‐expression drove membrane protrusion.
Claire Strauel +8 more
wiley +1 more source
Evolutionarily divergent DUF4465 domains have a common vitamin B12‐binding function
We show that DUF4465 family proteins, widespread across bacteria from gut microbiomes, hydrothermal vents, and soil, share a common vitamin B12‐binding function. These augmented β‐jellyroll proteins bind vitamin B12 via extended loops. Our findings establish sequence‐diverse DUF4465 proteins as a widespread class of B12‐binding proteins, highlighting ...
Charlea Clarke +4 more
wiley +1 more source
Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky +8 more
wiley +1 more source
Efficient DDoS Detection Based on K-FKNN in Software Defined Networks
Software Defined Networking (SDN) centrally manages the network data layer to improve the programmability and flexibility of networks by the controller. Because of centralized control, SDN is vulnerable to Distributed Denial of Service (DDoS) attacks. In
Yuhua Xu +3 more
doaj +1 more source
Imputing missing genotypes with weighted k nearest neighbors [PDF]
Motivation: Missing values are a common problem in genetic association studies concerned with single nucleotide polymorphisms (SNPs). Since most statistical methods cannot handle missing values, they have to be removed prior to the actual analysis ...
Ickstadt, Katja, Schwender, Holger
core
CSD: Discriminance with Conic Section for Improving Reverse k Nearest Neighbors Queries
The reverse $k$ nearest neighbor (R$k$NN) query finds all points that have the query point as one of their $k$ nearest neighbors ($k$NN), where the $k$NN query finds the $k$ closest points to its query point. Based on the characteristics of conic section,
Bai, Mingyuan +5 more
core
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu +14 more
wiley +1 more source
Evaluation of Image Recognition [PDF]
Práce se zabývá způsoby rozpoznávání obrazu a moţnostmi jejich vyhodnocování. Součástí je návrh a implementace metody porovnání vlivu předzpracování na vybrané algoritmy rozpoznávání obrazu.
Kučerová, Pavla
core
Impact of Asymptomatic Intracranial Hemorrhage on Outcome After Endovascular Stroke Treatment
ABSTRACT Background Endovascular treatment (EVT) achieves high rates of recanalization in acute large‐vessel occlusion (LVO) stroke, but functional recovery remains heterogeneous. While symptomatic intracranial hemorrhage (sICH) has been well studied, the prognostic impact of asymptomatic intracranial hemorrhage (aICH) after EVT is less certain ...
Shihai Yang +22 more
wiley +1 more source

