![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessMeta-analysis of 46,000 germline de novo mutations linked to human inherited disease
De novo mutations (DNMs) are variants that occur anew in the offspring of noncarrier parents. They are not inherited from either parent but rather result from endogenous mutational processes involving errors of D...
-
Article
Open AccessCorrection to: Validation of the Short Version (TLS-15) of the Triangular Love Scale (TLS-45) Across 37 Languages
-
Article
Open AccessValidation of the Short Version (TLS-15) of the Triangular Love Scale (TLS-45) across 37 Languages
Love is a phenomenon that occurs across the world and affects many aspects of human life, including the choice of, and process of bonding with, a romantic partner. Thus, develo** a reliable and valid measure...
-
Article
Open AccessGroup recommender systems for tourism: how does personality predict preferences for attractions, travel motivations, preferences and concerns?
To travel in leisure is an emotional experience, and therefore, the more the information about the tourist is known, the more the personalized recommendations of places and attractions can be made. But if to p...
-
Article
Open AccessTargIDe: a machine-learning workflow for target identification of molecules with antibiofilm activity against Pseudomonas aeruginosa
Bacterial biofilms are a source of infectious human diseases and are heavily linked to antibiotic resistance. Pseudomonas aeruginosa is a multidrug-resistant bacterium widely present and implicated in several hos...
-
Article
Compensatory epistasis explored by molecular dynamics simulations
A non-negligible proportion of human pathogenic variants are known to be present as wild type in at least some non-human mammalian species. The standard explanation for this finding is that molecular mechanism...
-
Article
Performance evaluation of unsupervised techniques in cyber-attack anomaly detection
Cyber security is a critical area in computer systems especially when dealing with sensitive data. At present, it is becoming increasingly important to assure that computer systems are secured from attacks due...
-
Article
A systematic review of gamification techniques applied to elderly care
The proportion of the world’s population growing older is rapidly increasing over the last decades. With the recent progresses seen in information and communication technologies, there have been great concerns...
-
Article
Including cognitive aspects in multiple criteria decision analysis
Many multiple criteria decision analysis (MCDA) methods have been proposed over the last decades. Some of the most known methods share some similarities in the way they are used and configured. However, we liv...
-
Article
Dynamic argumentation in UbiGDSS
Supporting and representing the group decision-making process is a complex task that requires very specific aspects. The current existing argumentation models cannot make good use of all the advantages inheren...
-
Article
High-dimensional geostatistical history matching
Hydrocarbon reservoir modelling and characterisation is a challenging subject within the oil and gas industry due to the lack of well data and the natural heterogeneities of the Earth’s subsurface. Integrating...
-
Article
Intelligent negotiation model for ubiquitous group decision scenarios
Supporting group decision-making in ubiquitous contexts is a complex task that must deal with a large amount of factors to succeed. Here we propose an approach for an intelligent negotiation model to support t...
-
Article
Open AccessEpistatic interactions modulate the evolution of mammalian mitochondrial respiratory complex components
The deleterious effect of a mutation can be reverted by a second-site interacting residue. This is an epistatic compensatory process explaining why mutations that are deleterious in some species are tolerated ...