Results 61 to 70 of about 332,227 (273)

TEST CASE PRIORITIZATION USING HYPERLINK RANKING - A GRAPH THEORY BASED APPROACH

open access: yesInternational Journal of Research in Engineering and Technology, 2013
Era of cloud computing where majority of the applic ation is becoming web based enterprise computing. U ser prefer online web application for easy of use and business continuity [1]. Software companies have come up in huge numbe rs for developing web based enterprise application.
openaire   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Evaluation of excavator technologies: application of data fusion based MULTIMOORA methods

open access: yesJournal of Civil Engineering and Management, 2015
Excavators are quite expensive vehicles. Therefore, there may be huge losses for decision makers if a wrong decision is made during the purchasing process.
Serkan Altuntas   +2 more
doaj   +1 more source

Applying novel connectivity networks to wood turtle populations to provide comprehensive conservation management strategies for species at risk.

open access: yesPLoS ONE, 2022
Genetic diversity within and among populations is frequently used in prioritization processes to rank populations based on their vulnerability or distinctiveness, however, connectivity and gene flow are rarely considered within these frameworks.
Cindy Bouchard   +3 more
doaj   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Modified Interior-Point Method for Large-and-Sparse Low-Rank Semidefinite Programs

open access: yes, 2017
Semidefinite programs (SDPs) are powerful theoretical tools that have been studied for over two decades, but their practical use remains limited due to computational difficulties in solving large-scale, realistic-sized problems.
Lavaei, Javad, Zhang, Richard Y.
core   +1 more source

Graphs associated with nilpotent Lie algebras of maximal rank [PDF]

open access: yes, 2003
In this paper, we use the graphs as a tool to study nilpotent Lie algebras. It implies to set up a link between graph theory and Lie theory. To do this, it is already known that every nilpotent Lie algebra of maximal rank is associated with a generalized
Díaz Delgado, José Eduardo   +3 more
core   +1 more source

RIPK4 function interferes with melanoma cell adhesion and metastasis

open access: yesMolecular Oncology, EarlyView.
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski   +9 more
wiley   +1 more source

Visualisation and graph-theoretic analysis of a large-scale protein structural interactome

open access: yesBMC Bioinformatics, 2003
Background Large-scale protein interaction maps provide a new, global perspective with which to analyse protein function. PSIMAP, the Protein Structural Interactome Map, is a database of all the structurally observed interactions between superfamilies of
Harrington Richard   +4 more
doaj   +1 more source

Graph Theory Based N-1 Transmission Contingency Selection and Its Application in Security-constrained Unit Commitment

open access: yesJournal of Modern Power Systems and Clean Energy, 2021
Contingency analysis is an important building block in the stability and reliability analysis of power grid operations. However, due to the large number of transmission lines, in practice only a limited number of contingencies could be evaluated.
Lu Nan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy