Primary biliary cholangitis (PBC) is a chronic, cholestatic, immune-mediated, and progressive liver disorder. Treatment to preventing the disease from advancing into later and irreversible stages is still an unmet clinical need. Accordingly, we set up a drug repurposing framework to find potential...
01a Articolo in rivista
-
-
Here we present EdgeSHAPer, a workflow for explaining graph neural networks by approximating Shapley values using Monte Carlo sampling. In this protocol, we describe steps to execute Python scripts for a chemical dataset from the original publication; however, this approach is also applicable to...
-
Graph neural networks (GNNs) recursively propagate signals along the edges of an input graph, integrate node feature information with graph structure, and learn object representations. Like other deep neural network models, GNNs have notorious black box character. For GNNs, only few approaches are...
-
Brain-Computer Interface (BCI) systems for motor rehabilitation after stroke have proven their efficacy to enhance upper limb motor recovery by reinforcing motor related brain activity. Hybrid BCIs (h-BCIs) exploit both central and peripheral activation and are frequently used in assistive BCIs to...
-
This paper addresses the issue of assessing the sustainability of policy decisions of the Energy Retail Market, explicitly considering the retail energy market, unlike existing approaches in the literature that analyze the energy market as a whole. The sustainability assessment is treated as the...
-
We propose an innovative use of the Leiden Rankings (LR) in institutional management. Although LR only consider research output of major universities reported in Web of Science (WOS) and share the limitations of other existing rankings, we show that they can be used as a base of a heuristic...
-
-
Linear Temporal Logic (LTL) synthesis aims at automatically synthesizing a program that complies with desired properties expressed in LTL. Unfortunately it has been proved to be too difficult computationally to perform full LTL synthesis. There have been two success stories with LTL synthesis, both...
-
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. It is a type of cyber attack often successful because users are not aware of their vulnerabilities or are unable to understand the risks. This article presents...
-
Manufacturing is transitioning from a mass production model to a service model in which facilities ‘bid’ to produce products. To decide whether to bid for a complex, previously unseen product, a facility must be able to synthesize, on the fly, a process plan controller that delegates abstract...