Results 91 to 100 of about 11,357,928 (275)

PERANCANGAN ALGORITMA DAN PEMROGRAMAN KOMPUTER DALAM BAHASA TURBO BASIC DAN PASCAL UNTUK MEMPREDIKSI TINGKAT KELANGSUNGAN HIDUP (GOING CONCERN) PERUSAHAAN DENGAN PARAMETER ALTMAN Z-SCORE

open access: yesEkuitas: Jurnal Ekonomi dan Keuangan, 2018
As we know that,the aspect of going concern or bankruptcy of the entitiy become the issued or the problem must be considered by the external auditor.In the profession of Public Acccountant.\The external auditor must give the opinion objectively and ...
Yudha Herlambang
doaj   +1 more source

Open Source Code – „Between West & East” [PDF]

open access: yesZeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki, 2011
The digital technologies based on digital hardware and software are driving the second in-dustrial revolution; more than 12% of Gross World Product are related to IT.
Przemysław Bakowski
doaj   +1 more source

Lossless source coding for multiple access networks [PDF]

open access: yes, 2001
A multiple access source code (MASC) is a source code designed for the following network configuration: a pair of jointly distributed information sequences {Xi}i=1∞ and {Yi}i=1∞ is drawn i.i.d. according to joint probability mass function (p.m.f.) p(x,y);
Effros, Michelle, Zhao, Qian
core  

Elucidating prognostic significance of purine metabolism in colorectal cancer through integrating data from transcriptomic, immunohistochemical, and single‐cell RNA sequencing analysis

open access: yesMolecular Oncology, EarlyView.
Low expression of five purine metabolism‐related genes (ADSL, APRT, ADCY3, NME3, NME6) was correlated with poor survival in colorectal cancer. Immunohistochemistry analysis showed that low NME3 (early stage) and low ADSL/NME6 (late stage) levels were associated with high risk.
Sungyeon Kim   +8 more
wiley   +1 more source

Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review

open access: yesComputers
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez   +1 more
doaj   +1 more source

Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu   +15 more
wiley   +1 more source

A Novel Method for Code Clone Detection Based on Minimally Random Kernel Convolutional Transform

open access: yesIEEE Access
Effectively detecting code clones is essential for maintaining and evolving software systems. This paper introduces a novel approach that leverages minimally random kernel convolutional transform (MiniRocket) to represent source code for clone detection.
Mostefai Abdelkader
doaj   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment

open access: yesIEEE Access
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy