Results 121 to 130 of about 11,579,038 (330)

The BELLFLOW system [PDF]

open access: yes, 1970
The BELLFLOW flowcharting system was developed to meet certain Bell System standards of documentation. There are three modes of operation with the BELLFLOW system: source mode, comment mode, and mixed mode.
Pardee, S.
core   +1 more source

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Data‐driven discovery of gene expression markers distinguishing pediatric acute lymphoblastic leukemia subtypes

open access: yesMolecular Oncology, EarlyView.
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh   +8 more
wiley   +1 more source

MicroRNA 196a contributes to the aggressiveness of esophageal adenocarcinoma through the MYC/TERT/NFκB axis

open access: yesMolecular Oncology, EarlyView.
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo   +8 more
wiley   +1 more source

Big Coding Data: Analysis, Insights, and Applications

open access: yesIEEE Access
In recent years, there has been a notable surge in the generation of coding data on various platforms, including programming competitions and educational institutions.
Md. Mostafizer Rahman   +2 more
doaj   +1 more source

TRPM8 levels determine tumor vulnerability to channel agonists

open access: yesMolecular Oncology, EarlyView.
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo   +18 more
wiley   +1 more source

Profile-driven Source Code Exploration [PDF]

open access: yesAnnals of computer science and information systems, 2015
Emília Pietriková, Sergej Chodarev
doaj   +1 more source

Phylogenetic Trees And A Rule For Identifying Original Source Codes [PDF]

open access: yesWarasan Witthayasat Lae Theknoloyi Mahawitthayalai Mahasarakham, 2019
Plagiarism is deemed a serious ethical offense. Without proper protection and accurate detection algorithms, the number of innovations would significantly dwindle, impeding the advancement of national research and education.
Nutthanon Leelathakul
doaj  

Feature dependence graph based source code loophole detection method

open access: yesTongxin xuebao, 2023
Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the ...
Hongyu YANG   +3 more
doaj  

Source-code plagiarism : an academic perspective [PDF]

open access: yes
In computing courses, students are often required to complete tutorial and laboratory exercises asking them to produce source-code. Academics may require students to submit source-code produced as part of such exercises in order to monitor their students’
Cosma, Georgina, Joy, Mike
core  

Home - About - Disclaimer - Privacy