Results 91 to 100 of about 6,055,547 (381)

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Vulnerability Assessment Method for Immovable Cultural Relics Based on Artificial Neural Networks—An Example of a Heavy Rainfall Event in Henan Province

open access: yesInternational Journal of Disaster Risk Science, 2022
Cultural relic conservation capability is an important issue in cultural relic conservation research, and it is critical to decrease the vulnerability of immovable cultural relics to rainfall hazards.
Can Xu   +4 more
doaj   +1 more source

Vulnerability assessments of pesticide leaching to groundwater [PDF]

open access: yes, 2007
Pesticides may have adverse environmental effects if they are transported to groundwater and surface waters. The vulnerability of water resources to contamination of pesticides must therefore be evaluated.
Stenemo, Fredrik
core  

Impact assessment for vulnerabilities in open-source software libraries

open access: yes, 2015
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik   +2 more
core   +1 more source

Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry

open access: yesMolecular Oncology, EarlyView.
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson   +11 more
wiley   +1 more source

Coal Mine Gas Explosion Vulnerability Assessment Based on the “Glass Heart” Model

open access: yesGeofluids, 2021
Gas explosion, which is the main type of accidents reported in coal mines, comes with serious economic and safety consequences. The present work adopts the “glass heart” model for assessing the vulnerability of coal mines to gas explosions based on a ...
Shuicheng Tian, Pengfei Yang, Kai Tang
doaj   +1 more source

The predictive validity of the short-term assessment of risk and treatability (START) for multiple adverse outcomes in a secure psychiatric inpatient setting [PDF]

open access: yes, 2015
The Short-Term Assessment of Risk and Treatability (START) aims to assist mental health practitioners to estimate an individual’s short-term risk for a range of adverse outcomes via structured consideration of their risk (“Vulnerabilities”) and ...
Dickens, Geoffrey L.   +2 more
core   +2 more sources

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

open access: yesItalian National Conference on Sensors, 2018
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users.
B. Ali, A. Awad
semanticscholar   +1 more source

Chemoresistome mapping in individual breast cancer patients unravels diversity in dynamic transcriptional adaptation

open access: yesMolecular Oncology, EarlyView.
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani   +14 more
wiley   +1 more source

Design and implementation of a vulnerability assessment system for oil and gas pipelines in Natech events

open access: yesYou-qi chuyun
[Objective] The oil and gas conveyed in transmission pipelines are highly flammable and explosive. During natural disasters,these pipelines are susceptible to technological accidents such as fire, explosion, and environmental pollution, i.e.
CHEN Guohua, TAO Xia, ZHOU Lixing
doaj   +1 more source

Home - About - Disclaimer - Privacy