Results 121 to 130 of about 11,579,038 (330)
The BELLFLOW flowcharting system was developed to meet certain Bell System standards of documentation. There are three modes of operation with the BELLFLOW system: source mode, comment mode, and mixed mode.
Pardee, S.
core +1 more source
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu+12 more
wiley +1 more source
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh+8 more
wiley +1 more source
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo+8 more
wiley +1 more source
Big Coding Data: Analysis, Insights, and Applications
In recent years, there has been a notable surge in the generation of coding data on various platforms, including programming competitions and educational institutions.
Md. Mostafizer Rahman+2 more
doaj +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Profile-driven Source Code Exploration [PDF]
Emília Pietriková, Sergej Chodarev
doaj +1 more source
Phylogenetic Trees And A Rule For Identifying Original Source Codes [PDF]
Plagiarism is deemed a serious ethical offense. Without proper protection and accurate detection algorithms, the number of innovations would significantly dwindle, impeding the advancement of national research and education.
Nutthanon Leelathakul
doaj
Feature dependence graph based source code loophole detection method
Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the ...
Hongyu YANG+3 more
doaj
Source-code plagiarism : an academic perspective [PDF]
In computing courses, students are often required to complete tutorial and laboratory exercises asking them to produce source-code. Academics may require students to submit source-code produced as part of such exercises in order to monitor their students’
Cosma, Georgina, Joy, Mike
core