Results 111 to 120 of about 11,357,928 (275)
Big Coding Data: Analysis, Insights, and Applications
In recent years, there has been a notable surge in the generation of coding data on various platforms, including programming competitions and educational institutions.
Md. Mostafizer Rahman+2 more
doaj +1 more source
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu+12 more
wiley +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Profile-driven Source Code Exploration [PDF]
Emília Pietriková, Sergej Chodarev
doaj +1 more source
Phylogenetic Trees And A Rule For Identifying Original Source Codes [PDF]
Plagiarism is deemed a serious ethical offense. Without proper protection and accurate detection algorithms, the number of innovations would significantly dwindle, impeding the advancement of national research and education.
Nutthanon Leelathakul
doaj
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song+11 more
wiley +1 more source
In patients treated with atezolizumab as a part of the MyPathway (NCT02091141) trial, pre‐treatment ctDNA tumor fraction at high levels was associated with poor outcomes (radiographic response, progression‐free survival, and overall survival) but better sensitivity for blood tumor mutational burden (bTMB).
Charles Swanton+17 more
wiley +1 more source
Feature dependence graph based source code loophole detection method
Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the ...
Hongyu YANG+3 more
doaj
Software development practices rely extensively on reusing source code written by other programmers. One of the recurring questions about such practice is how much programmers, acting as users of somebody else’s code, really understand the source code ...
Luana Müller+2 more
doaj +1 more source
Genomics‐led approach to drug testing in models of undifferentiated pleomorphic sarcoma
GA text Genomic data from undifferentiated pleomorphic sarcoma patients and preclinical models were used to inform a targeted drug screen. Selected compounds were tested in 2D and 3D cultures of UPS cell lines. A combination of trametinib and infigratinib was synergistic in the majority of UPS cell lines tested, which was further confirmed in an ex ...
Piotr J. Manasterski+19 more
wiley +1 more source