Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Coding and Information Theory 1
- Coding theory 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Information theory 1
- Mathematical and Computational Biology 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
441
INTERPASSIVITY AS A SUBJECTIVE EFFECT OF MODERN MEDIA-CULTURE: TO THE STATEMENT OF PROBLEM
Published 2014-06-01“…Methodological base of research of contemporary experience of subjectivity is heuristic "ontological turn" in social theory, which allows to consider the subjectivity not as a reality (given), but as a procedural phenomenon, performativity, which exist in conditions of unstable ontologies, world without guarantees, indirect, thus, mass-media representations. …”
Get full text
Article -
442
Expression Profiles of Differentially Expressed Circular RNAs and circRNA–miRNA–mRNA Regulatory Networks in SH-SY5Y Cells Infected with Coxsackievirus B5
Published 2022-01-01“…Out of 5,665 circRNAs identified to be expressed in SH-SY5Y cells, 163 circRNAs were found to be differentially expressed significantly. Moreover, Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) analyses showed that the differentially expressed circRNAs were mainly involved in ubiquitin-mediated proteolysis and signaling pathways during CVB5 infection. …”
Get full text
Article -
443
The Systematic Analysis of Exercise Mechanism in Human Diseases
Published 2022-01-01“…To study and analyze the samples in the GSE18966 gene expression profile, we first performed an analysis on the differential expressed genes (DEGs) through GEO2R, and then the DEGs enrichment in Gene Ontology functions and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathways through the Database for Annotation, Visualization and Integrated Discovery database was conducted. …”
Get full text
Article -
444
Identification of genes involved in energy metabolism in preeclampsia and discovery of early biomarkers
Published 2025-02-01“…Enrichment analyses using gene ontology, Kyoto Encyclopedia of Genes and Genomes, and gene set enrichment were performed. …”
Get full text
Article -
445
Exploration on Molecular Mechanism of Reversal Effect of Compound Danshen Tablets on Hepatic Fibrosis Based on Network Pharmacology
Published 2022-01-01“…The DAVID enrichment database (the database for annotation, visualization, and integrated discovery) was adopted for GO (Gene Ontology) enrichment and KEGG (Kyoto Encyclopedia of Genes and Genomes) pathway enrichment of vital nodes. …”
Get full text
Article -
446
JEANAS PAULIS SARTRE'AS: "PONO-VERGO" DIALEKTIKA IR SOLIPSIZMO ĮVEIKOS ILGESYS
Published 2003-01-01“…Why this dialectics is incompatible with the modus of Mitsein in Martin Heidegger fundamental ontology? Sartre seeks to reveal the possibility of meeting the Other in the battle of freedoms by the analysis of concrete relations with the Other and by this to avoid solipsism. …”
Get full text
Article -
447
USE OF INTELLEGENT AND BLOCK CHAIN TECHNOLOGIES IN INFORMATION MANAGEMENT Minsk Innovation University
Published 2018-06-01“…It forms the semantics on the ontology dase, creating new opportunities for IA to perform various user requests. …”
Get full text
Article -
448
Integrated bioinformatic approach of Balur therapy for breast cancer subtypes
Published 2025-01-01“…The Cytoscape software was used to construct the network of Balur compounds and target proteins of breast cancer subtypes. Gene Ontology, pathway, docking, hub gene, and survival analysis were applied to investigate the detailed mechanism of Balur to breast cancer in each subtype. …”
Get full text
Article -
449
The definition of the state value in terms of functional quintessence
Published 2024-03-01“…The author further provides the features inherent in the State which constitute its ontology. Based on a comprehensive analysis of the essence of the concept of “state”, the article presents some theories of the origin of the state which reflect the purpose of its emergence and existence. …”
Get full text
Article -
450
Differentially Expressed Genes Study Shown Potential for BCG Stimulation in Reducing the Severity of COVID-19
Published 2022-01-01“…DEGs that have a high-trust network were collected and functional cluster analysis of biological processes from Gene Ontology (GO), pathway analysis from the Human KEGG pathway, and COVID-19-related gene analysis was carried out using the Enrichr database. …”
Get full text
Article -
451
Semantic Integration of Sensor Data and Disaster Management Systems: The Emergency Archetype Approach
Published 2013-05-01“…Therefore, part of the semantic richness coming from the SSW, such as the Semantic Sensor Network Ontology (SSNO), is lost when sensor data is embedded in current ERM messages. …”
Get full text
Article -
452
Classification of Colon Cancer Patients Based on the Methylation Patterns of Promoters
Published 2016-06-01“…In addition, we analyzed the functional ontology of aberrantly methylated genes and identified the G-protein-coupled receptor signaling pathway as one of the major pathways affected epigenetically. …”
Get full text
Article -
453
JEANAS PAULIS SARTRE'AS: "PONO-VERGO" DIALEKTIKA IR SOLIPSIZMO ĮVEIKOS ILGESYS
Published 2003-01-01“…Why this dialectics is incompatible with the modus of Mitsein in Martin Heidegger fundamental ontology? Sartre seeks to reveal the possibility of meeting the Other in the battle of freedoms by the analysis of concrete relations with the Other and by this to avoid solipsism. …”
Get full text
Article -
454
System Review about Function Role of ESCC Driver Gene KDM6A by Network Biology Approach
Published 2016-01-01“…Then, we evaluate the pathways, which are statistically involved in the network derived from KDM6A. Lastly, gene ontology analysis of clusters of genes in the network was conducted. …”
Get full text
Article -
455
Cellular senescence-associated genes in rheumatoid arthritis: Identification and functional analysis.
Published 2025-01-01“…We explored the roles of these DEGs in cellular senescence through Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analysis. …”
Get full text
Article -
456
Transcriptome Analysis of the Thymus in Short-Term Calorie-Restricted Mice Using RNA-seq
Published 2018-01-01“…These DEGs were clustered into Gene Ontology (GO) categories. The expression pattern revealed by RNA-seq was validated by quantitative real-time PCR (qPCR) analysis of four important genes, which are leptin, ghrelin, Igf1, and adinopectin. …”
Get full text
Article -
457
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
458
Axiology of law in civil society
Published 2023-09-01“…The article considers the main elements of the axiology of law in civil society, defines the essence of law through the analysis of approaches to law understanding, which made it possible to establish the ontology of this concept. It is concluded that law is a means of regulating social relations and resolving contradictions between members of society. …”
Get full text
Article -
459
From ChatGPT to Sora: Analyzing Public Opinions and Attitudes on Generative Artificial Intelligence in Social Media
Published 2025-01-01“…Word co-occurrence network analysis, topic modeling based on Latent Dirichlet Allocation (LDA), and emotional characteristics based on the DLUT Emotion Ontology and psycholinguistic analyses based on the Linguistic Inquiry and Word Count (LIWC) dictionary were employed to explore public views on these generative AI technologies. …”
Get full text
Article -
460
Rapid Identification and Systematic Mechanism of Flavonoids from Potentilla freyniana Bornm. Based on UHPLC-Q-Exactive Orbitrap Mass Spectrometry and Network Pharmacology
Published 2021-01-01“…Then, the core targets were predicted by protein-protein interaction network and network analysis. Finally, Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway enrichment analysis were carried out via DAVID. …”
Get full text
Article