Results 1 to 10 of about 36 (36)

Establishment of a Protocol for CE‐MS Based Peptidome Analysis of Human Saliva

open access: yesPROTEOMICS, EarlyView.
ABSTRACT Proteins and peptides indicate physiological or pathological states and are investigated to identify markers to scrutinize health and disease surveillance. Saliva contains many proteins and peptides that could serve as biomarkers, offering a potential noninvasive approach for disease detection.
Carl‐Johan Törnhage   +6 more
wiley   +1 more source

DICED (Database of Identified Cleavage Sites Endemic to Diseases States): A Searchable Web Interface for Terminomics/Degradomics

open access: yesPROTEOMICS, EarlyView.
ABSTRACT Proteolysis is an irreversible posttranslational modification with immense biological impact. Owing to its high disease significance, there is growing interest in investigating proteolysis on the proteome scale, termed degradomics. We developed ‘Database of Identified Cleavage sites Endemic to Disease states’ (DICED; https://diced.lerner.ccf ...
Jayadev Joshi   +5 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Leveraging Ethical Narratives to Enhance LLM‐AutoML Generated Machine Learning Models

open access: yesExpert Systems, Volume 42, Issue 7, July 2025.
ABSTRACT The growing popularity of generative AI and large language models (LLMs) has sparked innovation alongside debate, particularly around issues of plagiarism and intellectual property law. However, a less‐discussed concern is the quality of code generated by these models, which often contains errors and encourages poor programming practices. This
Jordan Nelson   +4 more
wiley   +1 more source

Guide in Designing an Asynchronous Performance‐Centric Framework for Heterogeneous Microservices in Time‐Critical Cybersecurity Applications. The BIECO Use Case

open access: yesExpert Systems, Volume 42, Issue 6, June 2025.
ABSTRACT This article presents the architecture, design and validation of a microservice orchestration approach that improves the flexibility of heterogeneous microservice‐based platforms. Improving user experience and interaction for time‐critical applications are aspects that were primary objectives for the design of the architecture.
Daniela Delinschi   +4 more
wiley   +1 more source

Search Multiple Types of Research Assets From Jupyter Notebook

open access: yesSoftware: Practice and Experience, Volume 55, Issue 5, Page 946-965, May 2025.
ABSTRACT Objective Data science and machine learning methodologies are essential to address complex scientific challenges across various domains. These advancements generate numerous research assets such as datasets, software tools, and workflows, which are shared within the open science community. Concurrently, computational notebook environments like
Na Li, Siamak Farshidi, Zhiming Zhao
wiley   +1 more source

Modeling and Accessing Smart Materials with Integrity Constraints in the Shapes Constraint Language and Ontologies—The SmaDi Way

open access: yesAdvanced Engineering Materials, Volume 27, Issue 8, April 2025.
Integrity constraints enforce consistency and completeness on data. The article discusses a newly developed validator for checking integrity constraints in Shapes Constraint Language (SHACL) through reduction to SPARQL Protocol and RDF Query Language (SPARQL) queries. It can be used with systems for ontology‐based database access.
Özgür L. Özçep   +5 more
wiley   +1 more source

Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments

open access: yesApplied AI Letters, Volume 6, Issue 2, April 2025.
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley   +1 more source

Positive dementia caregiving in 30 days (PDC30): Study protocol of a randomized controlled trial of a self‐guided automated online training program

open access: yesApplied Psychology: Health and Well-Being, Volume 17, Issue 1, Page 1-15, 25 February 2025.
Abstract The Benefit‐Finding Intervention, a face‐to‐face psychoeducation program with a focus on the positive meanings of caregiving, has been found to reduce depressive symptoms and burden in dementia caregivers. The program was revamped into a computer‐delivered web‐based program to enable 24/7 access without location restriction.
Sheung‐Tak Cheng, Peter H. F. Ng
wiley   +1 more source

Early PCOS Detection: A Comparative Analysis of Traditional and Ensemble Machine Learning Models With Advanced Feature Selection

open access: yesEngineering Reports, Volume 7, Issue 2, February 2025.
A comparative analysis of traditional and ensemble machine learning models with advanced feature selection to detect polycystic ovary syndrome. ABSTRACT PCOS (polycystic ovary syndrome) is a common hormonal disorder that affects many women during their reproductive years.
Khandaker Mohammad Mohi Uddin   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy