Results 101 to 110 of about 1,317,898 (360)

Adaptive reconstruction of software engineering courses in the context of intelligent big data [PDF]

open access: yesITM Web of Conferences
With the increasing innovation and application of big data and artificial intelligence, the job requirements for software engineering majors have also undergone significant changes. The curriculum system is the main implementation method for professional
Li Jun, Sun Yang, Chen Jingliang
doaj   +1 more source

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

The anticancer effect of the HDAC inhibitor belinostat is enhanced by inhibitors of Bcl‐xL or Mcl‐1 in ovarian cancer

open access: yesMolecular Oncology, EarlyView.
The pan‐HDAC inhibitor belinostat increases the expression of the pro‐apoptotic proteins Bim, Puma, and Noxa and induces apoptosis in ovarian cancer cell lines and patient‐derived tumor organoids when used at high concentrations. Moreover, inhibiting the anti‐apoptotic proteins Bcl‐xL or Mcl‐1 sensitizes these preclinical models to the cytotoxic effect
Cécilia Thomine   +10 more
wiley   +1 more source

Sentiment Analysis for Software Engineering Domain in Turkish

open access: yesSakarya University Journal of Computer and Information Sciences, 2020
The focus of this study is to provide a model to be used for the identification of sentiments of comments about education and profession life of software engineering in social media and microblogging sites.
Mansur Alp Toçoğlu
doaj   +1 more source

Dose‐dependent induction of epithelial‐mesenchymal transition in 3D melanoma models by non‐thermal plasma treatment

open access: yesMolecular Oncology, EarlyView.
Non‐thermal plasma treatment of melanoma cells induced epithelial‐mesenchymal transition (EMT) in a dose‐dependent fashion. This report highlights the critical need to further investigate potential adverse effects of non‐thermal plasma for cancer therapy and to optimize treatment parameters for clinical translation. Despite the promising results of non‐
Eline Biscop   +10 more
wiley   +1 more source

Intellectual Property Right Protection in the Software Market [PDF]

open access: yes
We discuss the software patent should be granted or not. There exist two types of coping in the software market; reverse engineering and software duplication. Software patent can prevent both types of copies since a patent protects an idea.
Yasuhiro Arai
core  

Molecular imaging predicts trastuzumab‐deruxtecan (T‐DXd) response in head and neck cancer xenograft models

open access: yesMolecular Oncology, EarlyView.
Trastuzumab‐deruxtecan, a HER2‐targeting antibody‐drug conjugate, shows promising antitumor activity in head and neck squamous cell carcinoma with low HER2 expression. In vitro and in vivo studies demonstrated dose‐dependent cell death and tumor growth reduction in low HER2‐expressing cell lines, which correlated with drug accumulation measured using a
Abdullah Bin Naveed   +8 more
wiley   +1 more source

Handling Human Hacking: Creating a Comprehensive Defensive Strategy Against Modern Social Engineering [PDF]

open access: yes, 2015
Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through ...
Snyder, Charles
core   +1 more source

Home - About - Disclaimer - Privacy