Results 21 to 30 of about 186,948 (311)

A machine learning-based approach to ERα bioactivity and drug ADMET prediction

open access: yesFrontiers in Genetics, 2023
By predicting ERα bioactivity and mining the potential relationship between Absorption, Distribution, Metabolism, Excretion, Toxicity (ADMET) attributes in drug research and development, the development efficiency of specific drugs for breast cancer will
Tianbo An   +6 more
doaj   +1 more source

Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship

open access: yesMathematical Biosciences and Engineering, 2021
Spatial co-location pattern mining discovers the subsets of spatial features frequently observed together in nearby geographic space. To reduce time and space consumption in checking the clique relationship of row instances of the traditional co-location
Meijiao Wang   +3 more
doaj   +1 more source

Computer and Network Security [PDF]

open access: yes, 2020
175 pages, 87 figures and 44 ...
Sen, Jaydip   +16 more
openaire   +3 more sources

Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker

open access: yesIET Information Security, 2022
After several years, crypto‐ransomware attacks still constitute a principal threat for individuals and organisations worldwide. Despite the fact that a number of solutions are deployed to fight against this plague, one main challenge is that of early ...
José Antonio Gómez‐Hernández   +2 more
doaj   +1 more source

HBTBD: A Heterogeneous Bitcoin Transaction Behavior Dataset for Anti-Money Laundering

open access: yesApplied Sciences, 2023
In this paper, we predict money laundering in Bitcoin transactions by leveraging a deep learning framework and incorporating more characteristics of Bitcoin transactions.
Jialin Song, Yijun Gu
doaj   +1 more source

A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks

open access: yesIEEE Access, 2020
The chemical terrorist attack is a type of unconventional terrorism that threatens the safety of cities. This kind of terrorist attack is highly concealed and difficult to be detected.
Rongchen Zhu   +3 more
doaj   +1 more source

DyCARS: A dynamic context-aware recommendation system

open access: yesMathematical Biosciences and Engineering
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou   +7 more
doaj   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

ECGYOLO: Mask Detection Algorithm

open access: yesApplied Sciences, 2023
Of past years, wearing masks has turned into a necessity in daily life due to the rampant new coronavirus and the increasing importance people place on health and life safety.
Wenyi Hu   +6 more
doaj   +1 more source

Pericytes change function depending on glioblastoma vicinity: emphasis on immune regulation

open access: yesMolecular Oncology, EarlyView.
Pericytes alter their transcriptome depending on their proximity to the tumor core. In the tumor core, pericytes display a more active state with higher communication strength but with lower immune activation potential and a shift toward extracellular matrix production.
Carolina Buizza   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy