Results 91 to 100 of about 11,357,928 (275)
As we know that,the aspect of going concern or bankruptcy of the entitiy become the issued or the problem must be considered by the external auditor.In the profession of Public Acccountant.\The external auditor must give the opinion objectively and ...
Yudha Herlambang
doaj +1 more source
Open Source Code – „Between West & East” [PDF]
The digital technologies based on digital hardware and software are driving the second in-dustrial revolution; more than 12% of Gross World Product are related to IT.
Przemysław Bakowski
doaj +1 more source
Lossless source coding for multiple access networks [PDF]
A multiple access source code (MASC) is a source code designed for the following network configuration: a pair of jointly distributed information sequences {Xi}i=1∞ and {Yi}i=1∞ is drawn i.i.d. according to joint probability mass function (p.m.f.) p(x,y);
Effros, Michelle, Zhao, Qian
core
Low expression of five purine metabolism‐related genes (ADSL, APRT, ADCY3, NME3, NME6) was correlated with poor survival in colorectal cancer. Immunohistochemistry analysis showed that low NME3 (early stage) and low ADSL/NME6 (late stage) levels were associated with high risk.
Sungyeon Kim+8 more
wiley +1 more source
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez+1 more
doaj +1 more source
Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu+15 more
wiley +1 more source
A Novel Method for Code Clone Detection Based on Minimally Random Kernel Convolutional Transform
Effectively detecting code clones is essential for maintaining and evolving software systems. This paper introduces a novel approach that leverages minimally random kernel convolutional transform (MiniRocket) to represent source code for clone detection.
Mostefai Abdelkader
doaj +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk+2 more
doaj +1 more source
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov+3 more
doaj +1 more source