The system rapidly scans the genome of cancer cells, could help researchers find targets for new drugs.
Cancer cells can have thousands of mutations in their DNA. However, only a handful of those actually drive the progression of cancer; the rest are just along for the ride.
Distinguishing these harmful driver mutations from the neutral passengers could help researchers identify better drug targets. To boost those efforts, an MIT-led team has built a new computer model that can rapidly scan the entire genome of cancer cells and identify mutations that occur more frequently than expected, suggesting that they are driving tumor growth. This type of prediction has been challenging because some genomic regions have an extremely high frequency of passenger mutations, drowning out the signal of actual drivers.
“We created a probabilistic, deep-learning method that allowed us to get a really accurate model of the number of passenger mutations that should exist anywhere in the genome,” says Maxwell Sherman, an MIT graduate student. “Then we can look all across the genome for regions where you have an unexpected accumulation of mutations, which suggests that those are driver mutations.”
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.