Results 51 to 60 of about 629,507 (282)

AAA+ protein unfoldases—the Moirai of the proteome

open access: yesFEBS Letters, EarlyView.
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley   +1 more source

A Novel Deep-Learning-Based Bug Severity Classification Technique Using Convolutional Neural Networks and Random Forest with Boosting

open access: yesSensors, 2019
The accurate severity classification of a bug report is an important aspect of bug fixing. The bug reports are submitted into the bug tracking system with high speed, and owing to this, bug repository size has been increasing at an enormous rate.
Ashima Kukkar   +5 more
doaj   +1 more source

Uniquely decodable n-gram embeddings

open access: yesTheoretical Computer Science, 2004
Abstract: "We define the family of n-gram embeddings from strings over a finite alphabet into the semimodule N[superscript K]. We classify all [xi] [element of] N[superscript K] that are valid images of strings under such embeddings, as well as all [xi] whose inverse image consists of exactly 1 string (we call such [xi] uniquely decodable).
openaire   +2 more sources

Dimethyl fumarate combined with cisplatin at subcytotoxic doses sensitizes cervical cancer toward ferroptosis and apoptosis through GSH restriction and p53 (re)activation

open access: yesMolecular Oncology, EarlyView.
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano   +6 more
wiley   +1 more source

Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques

open access: yesJOIV: International Journal on Informatics Visualization, 2023
Various forms of distributed denial of service (DDoS) assault systems and servers, including traffic overload, request overload, and website breakdowns.
Andi Maslan   +4 more
doaj   +1 more source

Engineered extracellular vesicles enriched with the miR‐214/199a cluster enhance the efficacy of chemotherapy in ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang   +12 more
wiley   +1 more source

Automatic document summarization based on statistical information

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2017
Actual problem in nowadays is to efficiently process the large amount of data that pass through our mind everyday. The object of study of this paper is automatic summarization algorithms.
A. Mussina   +3 more
doaj  

Authorship Attribution Using a Neural Network Language Model

open access: yes, 2016
In practice, training language models for individual authors is often expensive because of limited data resources. In such cases, Neural Network Language Models (NNLMs), generally outperform the traditional non-parametric N-gram models.
Ge, Zhenhao   +2 more
core   +1 more source

Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer

open access: yesMolecular Oncology, EarlyView.
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley   +1 more source

Fast N-Gram Language Model Look-Ahead for Decoders With Static Pronunciation Prefix Trees [PDF]

open access: yes, 2008
Decoders that make use of token-passing restrict their search space by various types of token pruning. With use of the Language Model Look-Ahead (LMLA) technique it is possible to increase the number of tokens that can be pruned without loss of decoding ...
Huijbregts, Marijn   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy