Results 71 to 80 of about 3,361,942 (285)
Open-source software for generating electrocardiogram signals
ECGSYN, a dynamical model that faithfully reproduces the main features of the human electrocardiogram (ECG), including heart rate variability, RR intervals and QT intervals is presented.
Cifford, Gari D., McSharry, Patrick E.
core +2 more sources
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
Open Source vs Closed Source Software: Public Policies in the Software Market [PDF]
This paper analyses the impact of public policies supporting open source software (OSS). Users can be divided between those who know about the existence of OSS, the "informed" adopters, and the "uninformed" ones; the presence of uniformed users yields to
Fabio M. Manenti, Stefano Comino
core
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon +9 more
wiley +1 more source
Un GIS senza frontiere, Un report della open source free software GIS-GRASS users conference 2002
Un GIS senza frontiere, Un report della open source free software GIS-GRASS users conference ...
Marco Ciolli, Paolo Zatelli
doaj +2 more sources
Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta +10 more
wiley +1 more source
Network Perimeter Defenses Using Open-Source Software
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services.
Mohammed A. Al-Qassim +1 more
doaj +1 more source
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge +17 more
wiley +1 more source
Automating Open Source Software License Information Generation in Software Projects [PDF]
This publication deals with Open Source Software (OSS) compliance. In a previous publication [1], we presented an organizational-technical concept for ensuring basic OSS compliance. Based on this concept, we now address further aspects that are essential
Sergius Dyck +3 more
doaj
Software architectures and Open Source Software: Where can research leverage the most? [PDF]
Software architectures have been playing a central role in software engineering research for some years now. They are considered of pivotal importance in the success of complex software systems development.
Arief, B., Gacek, C., Lawrie, T.
core

