Results 41 to 50 of about 184,016 (328)

The thioredoxin‐like and one glutaredoxin domain are required to rescue the iron‐starvation phenotype of HeLa GLRX3 knock out cells

open access: yesFEBS Letters, EarlyView.
Glutaredoxin (Grx) 3 proteins contain a thioredoxin domain and one to three class II Grx domains. These proteins play a crucial role in iron homeostasis in eukaryotic cells. In human Grx3, at least one of the two Grx domains, together with the thioredoxin domain, is essential for its function in iron metabolism.
Laura Magdalena Jordt   +4 more
wiley   +1 more source

Recurrent quantum embedding neural network and its application in vulnerability detection

open access: yesScientific Reports
In recent years, deep learning has been widely used in vulnerability detection with remarkable results. These studies often apply natural language processing (NLP) technologies due to the natural similarity between code and language.
Zhihui Song   +4 more
doaj   +1 more source

A GIS-based multi-criteria evaluation framework for uncertainty reduction in earthquake disaster management using granular computing

open access: yesGeodesy and Cartography, 2016
One of the most important steps in earthquake disaster management is the prediction of probable damages which is called earthquake vulnerability assessment.
Fatemeh Khamespanah   +3 more
doaj   +1 more source

Art of singular vectors and universal adversarial perturbations

open access: yes, 2017
Vulnerability of Deep Neural Networks (DNNs) to adversarial attacks has been attracting a lot of attention in recent studies. It has been shown that for many state of the art DNNs performing image classification there exist universal adversarial ...
Khrulkov, Valentin, Oseledets, Ivan
core   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

TOMM20 as a driver of cancer aggressiveness via oxidative phosphorylation, maintenance of a reduced state, and resistance to apoptosis

open access: yesMolecular Oncology, EarlyView.
TOMM20 increases cancer aggressiveness by maintaining a reduced state with increased NADH and NADPH levels, oxidative phosphorylation (OXPHOS), and apoptosis resistance while reducing reactive oxygen species (ROS) levels. Conversely, CRISPR‐Cas9 knockdown of TOMM20 alters these cancer‐aggressive traits.
Ranakul Islam   +9 more
wiley   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

A survey of fault tolerance in cloud computing

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Cloud computing has brought about a transformation in the delivery model of information technology from a product to a service. It has enabled the availability of various software, platforms and infrastructural resources as scalable services on demand ...
Priti Kumari, Parmeet Kaur
doaj  

Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry

open access: yesMolecular Oncology, EarlyView.
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson   +11 more
wiley   +1 more source

Automated Vulnerability Discovery and Exploitation in the Internet of Things

open access: yesSensors, 2019
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial:
Zhongru Wang   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy