Results 71 to 80 of about 131,864 (294)

Infrared laser sampling of low volumes combined with shotgun lipidomics reveals lipid markers in palatine tonsil carcinoma

open access: yesMolecular Oncology, EarlyView.
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff   +11 more
wiley   +1 more source

Salp swarm optimizer for modeling the software fault prediction problem

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
This paper proposes the salp swarm algorithm (SSA) combined with a backpropagation neural network (BPNN) to solve the software fault prediction (SFP) problem.
Sofian Kassaymeh   +3 more
doaj   +1 more source

Is "Better Data" Better than "Better Data Miners"? (On the Benefits of Tuning SMOTE for Defect Prediction)

open access: yes, 2018
We report and fix an important systematic error in prior studies that ranked classifiers for software analytics. Those studies did not (a) assess classifiers on multiple criteria and they did not (b) study how variations in the data affect the results ...
Bennin Kwabena Ebo   +7 more
core   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Prediction of Fault Fix Time Transition in Large-Scale Open Source Project Data

open access: yesData, 2019
Open source software (OSS) programs are adopted as embedded systems regarding their server usage, due to their quick delivery, cost reduction, and standardization of systems.
Hironobu Sone   +2 more
doaj   +1 more source

What Ruined Your Cake: Impacts of Code Modifications on Bug Distribution

open access: yesIEEE Access, 2020
In the current decade, software systems have been more intensively employed in every aspect of our lives. However, it is disappointing that the quality of software is far from satisfactory.
Jun Ai, Haoran Guo, W. Eric Wong
doaj   +1 more source

Software fault characteristics: A synthesis of the literature [PDF]

open access: yes, 2015
Faults continue to be a significant problem in software. Understanding the nature of these faults is important for practitioners and researchers. There are many published fault characteristics schemes but no one scheme dominates.
Bowes, D   +4 more
core  

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Fault Detection Effectiveness of Metamorphic Relations Developed for Testing Supervised Classifiers

open access: yes, 2019
In machine learning, supervised classifiers are used to obtain predictions for unlabeled data by inferring prediction functions using labeled data. Supervised classifiers are widely applied in domains such as computational biology, computational physics ...
Kanewala, Upulee, Saha, Prashanta
core   +1 more source

Dependable reconfigurable multi-sensor poles for security [PDF]

open access: yes, 2009
Wireless sensor network poles for security monitoring under harsh environments require a very high dependability as they are safety-critical [1]. An example of a multi-sensor pole is shown.
Kerkhoff, Hans G.
core   +3 more sources

Home - About - Disclaimer - Privacy