Results 101 to 110 of about 128,139 (284)
A mutually exclusive screening system is established to identify negative regulators of highly plastic genes. Dual specificity phosphatase (DUSP9) is a novel negative regulatory molecule of PD‐L1 by dephosphorylating STAT3, and acts as a target molecule in combination with PD‐1 antibody for tumor immunotherapy and a new clinical biomarker for ...
Yuzhe Hu +9 more
wiley +1 more source
Conditional logic and the Principle of Entropy
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
The Role of Ionic Liquids at the Biological Interfaces in Bioelectronics
Ionic liquids (ILs) are highlighted as key artificial ionic materials that bridge biological ion‐based signaling and electronic devices. By understanding their composition, structure, function relationships, and mechanisms, ILs can advance from high performance electrolyte to core materials enabling integrated, multifunctional bioelectronics for ...
Yeong‐sinn Ye +5 more
wiley +1 more source
Measuring the Inferential Values of Relations in Knowledge Graphs
Knowledge graphs, as an important research direction in artificial intelligence, have been widely applied in many fields and tasks. The relations in knowledge graphs have explicit semantics and play a crucial role in knowledge completion and reasoning ...
Xu Zhang +3 more
doaj +1 more source
On Classical and Quantum Logical Entropy: The analysis of measurement [PDF]
David Ellerman
openalex +1 more source
A note on conditional logics and entropy
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
Model of fuzzy risk assessment of the information system
A model of risk assessment was introduced to the estimation of the information system.The method,which combined AHP and fuzzy logical method,was applied to the risk assessment.AHP and fuzzy logical method were altered according to the actual condition of
ZHAO Dong-mei1 +2 more
doaj +2 more sources
Logic‐Gated HSV‐TK/GCV Suicide Gene Circuit for Triple‐Negative Breast Cancer
The BRAS comprises two modular genetic components driven by distinct tumor‐specific promoters and a failsafe layer with the NOT gate. This multi‐input logic gate circuit enables precise, specific expression of HSV‐TK in breast cancer cells with hardly expression in normal cell and effectively inhibits tumor growth in a triple‐negative breast cancer ...
Shasha Tang +10 more
wiley +1 more source
A Closed‐Loop Hybrid Discovery System of Type I Photosensitizers for Hypoxic Tumor Therapy
The work developed a closed‐loop hybrid discovery system to rationally design and predict high‐performance Type I PSs for hypoxic tumor therapy. 664 Potential candidates are identified from a dataset through a support vector machine (SVM) classification model, and two candidates are experimentally verified as Type I PSs, which highlighted the potential
Xia Ling +9 more
wiley +1 more source

