Results 51 to 60 of about 623,633 (264)

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Uniquely decodable n-gram embeddings

open access: yesTheoretical Computer Science, 2004
Abstract: "We define the family of n-gram embeddings from strings over a finite alphabet into the semimodule N[superscript K]. We classify all [xi] [element of] N[superscript K] that are valid images of strings under such embeddings, as well as all [xi] whose inverse image consists of exactly 1 string (we call such [xi] uniquely decodable).
openaire   +2 more sources

A Novel Deep-Learning-Based Bug Severity Classification Technique Using Convolutional Neural Networks and Random Forest with Boosting

open access: yesSensors, 2019
The accurate severity classification of a bug report is an important aspect of bug fixing. The bug reports are submitted into the bug tracking system with high speed, and owing to this, bug repository size has been increasing at an enormous rate.
Ashima Kukkar   +5 more
doaj   +1 more source

Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells

open access: yesFEBS Letters, EarlyView.
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López   +2 more
wiley   +1 more source

Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques

open access: yesJOIV: International Journal on Informatics Visualization, 2023
Various forms of distributed denial of service (DDoS) assault systems and servers, including traffic overload, request overload, and website breakdowns.
Andi Maslan   +4 more
doaj   +1 more source

Bayesian Grammar Induction for Language Modeling

open access: yes, 1995
We describe a corpus-based induction algorithm for probabilistic context-free grammars. The algorithm employs a greedy heuristic search within a Bayesian framework, and a post-pass using the Inside-Outside algorithm.
Chen, Stanley F.
core   +3 more sources

Monitoring of circulating tumor DNA allows early detection of disease relapse in patients with operable breast cancer

open access: yesMolecular Oncology, EarlyView.
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad   +35 more
wiley   +1 more source

Automatic document summarization based on statistical information

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2017
Actual problem in nowadays is to efficiently process the large amount of data that pass through our mind everyday. The object of study of this paper is automatic summarization algorithms.
A. Mussina   +3 more
doaj  

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma

open access: yesMolecular Oncology, EarlyView.
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy