Results 51 to 60 of about 1,280,003 (288)

Reconnecting Our Youth, a Scan of Policy Opportunities to Improve Economic Success for Vulnerable Youth [PDF]

open access: yes, 2012
In March 2012, Grad Nation campaign released its report on the progress of the nation's public schools in improving graduation rates and movement toward achieving the goal of a 4-year cohort graduation rate of 90 percent by 2020.
Linda Harris
core  

Atomic resolved material displacement on graphite surfaces by scanning tunnelling microscopy [PDF]

open access: yes, 1992
Atomic scale modifications and subsequent atomic resolution imaging has been achieved on the highly oriented pyrolytic graphite surface in air. Application of short pulse voltages, above a minimum threshold voltage of 3.5 V, across the tunneling gap ...
Akari S.   +4 more
core   +1 more source

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

Master slave en-face OCT/SLO [PDF]

open access: yes, 2015
Master Slave optical coherence tomography (MS-OCT) is an OCT method that does not require resampling of data and can be used to deliver en-face images from several depths simultaneously.
Biedermann   +37 more
core   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

COMPARISON OF OPTICAL BIOMETRY AND A SCAN FOR CALCULATION OF INTRAOCULAR LENS POWER IN AGE RELATED NUCLEAR CATARACT AT TERTIARY CARE EYE HOSPITAL

open access: yesPakistan Armed Forces Medical Journal, 2021
Objective: To compare optical biometry and A-scan for calculating intraocular lens power in patients with nuclear cataract at tertiary care eye hospital. Study Design: Cross sectional comparative study.
Aisha Rafique, Omar Zafar, Summaya Khan
doaj  

Investing in Boys and Young Men of Color: The Promise of Opportunity [PDF]

open access: yes, 2013
This issue brief presents findings from a scan of issues facing boys and men of color in education, health, and pathways to employment. Drawing on discussions, surveys, and interviews with experts and practitioners, the paper identifies 8 pressing ...
Kisha Bird, Linda Harris, Rhonda Bryant
core  

Transferrin receptor 1‐mediated iron uptake supports thermogenic activation in human cervical‐derived adipocytes

open access: yesFEBS Letters, EarlyView.
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai   +9 more
wiley   +1 more source

ALGORITMO QUE REDUCE DISTORSIÓN DE IMÁGENES ULTRASÓNICAS EN ENSAYOS NO DESTRUCTIVOS

open access: yesVisión Electrónica, 2014
Este artículo describe la investigación y el desarrollo de un sistema para la formación de imágenes por difracción de tiempo de vuelo (TOFD). El proceso para generarlas se logra con base en la adquisición de señales A-Scan, producto de la exploración de ...
Darío Segura
doaj  

A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation

open access: yesIEEE Access
Scan-based side-channel attacks have been proven to be popular attack methods against cryptographic chips. In these attacks, attackers can use scan chains inside a chip to obtain internal sensitive information of the chip, such as crypto key or other ...
Weizheng Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy