Results 101 to 110 of about 97,566 (303)

Chromatin Topology Reconfiguration Orchestrates Thermotolerant Male Fertility via GhAL5 in Cotton

open access: yesAdvanced Science, EarlyView.
This study investigates cotton’s high‐temperature (HT) response using multi‑omics. Dynamic 3D genome changes drive expression bias affecting male fertility. The tolerant line shows controlled chromatin dynamics, while the sensitive line exhibits overactivation.
Yanlong Li   +15 more
wiley   +1 more source

Navigating the Ethereal Tightrope: The Nanogenerator Manipulates Neurons for Immune Equilibrium

open access: yesAdvanced Science, EarlyView.
This review explores how nanogenerators modulate neuroimmune responses, offering innovative strategies for treating neurological disorders. By interfacing with neural pathways, they enable precise control of immune activity, especially via vagus nerve stimulation.
Jia Du   +5 more
wiley   +1 more source

Biodiversité, biotechnologies et savoirs traditionnels. du patrimoine commun de l'humanité aux ABS (access to genetic resources and benefit-sharing)

open access: yesRevue Tiers Monde, 2006
Cet article montre que les pays en developpement, en denoncant le statut de patrimoine commun de la biodiversite comme un heritage colonial des pays riches gardant un acces libre et gratuit a leurs ressources, et en revendiquant leur souverainete nationale sur ces ressources, ont bien plus fait le jeu des firmes de biotechnologies et fait avancer la ...
openaire   +5 more sources

Remote Modulation of Single‐Atom Catalyst Boosts High‐Valent Cobalt–Oxo Species Generation for Water Purification and Detoxification

open access: yesAdvanced Science, EarlyView.
This study develops a phosphorus‐doped cobalt single‐atom catalyst that enhances high‐valent cobalt–oxo species generation for water purification. This atomic‐level tuning boosts the catalyst's activity by 3.5 times, enabling efficient pollutant degradation. A continuous‐flow reactor achieves high, long‐term removal efficiency, producing water with low
Wen‐Min Wang   +4 more
wiley   +1 more source

The state of commercial augmentative biological control: plenty of natural enemies, but a frustrating lack of uptake [PDF]

open access: yes
Augmentative biological control concerns the periodical release of natural enemies. In com- mercial augmentative biological control, natural enemies are mass-reared in biofactories for release in large numbers to obtain an immediate control of pests. The
Lenteren, J.C., van
core   +3 more sources

Irradiated Tumor Cell‐Derived Microparticles Activate Systemic Anti‐Tumor Immunity via the STING/NLRP3/GSDMD Axis in Neutrophils

open access: yesAdvanced Science, EarlyView.
Radiotherapy induces tumor cells to release microparticles (RT‐MPs) into the circulation. The mitochondrial DNA carried by these RT‐MPs activates the STING/NLRP3/GSDMD axis in splenic neutrophils, triggering IL‐1β secretion. This, in turn, enhances dendritic cell function and facilitates the formation of cytotoxic T lymphocytes, thereby promoting ...
Yan Hu   +18 more
wiley   +1 more source

Access and benefit sharing biological materials for machines: Artificial intelligence, machine learning and deep learning

open access: yesPlants, People, Planet
Societal Impact Statement Future research and development of biological materials for foods, feeds, fibres, materials and medicines will increasingly rely on information and knowledge using Artificial Intelligence (AI) applications for detecting patterns
Charles Lawson   +2 more
doaj   +1 more source

cDC1 Subtype‐Specific In Vivo Targeting of Liposomes

open access: yesAdvanced Science, EarlyView.
Dendritic cells, particularly the cDC1 subtype, offer a promising target for drug delivery via liposomes due to their pivotal role in immune regulation, allowing for amplified therapeutic responses. Herein, we show an integration of physicochemical characterization and cell experiments to achieve effective in vivo cDC1 targeting through anti‐CLEC9A ...
Maximilian Schaaf   +11 more
wiley   +1 more source

ARPA Whitepaper [PDF]

open access: yes, 2018
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using ...
Chen, Jiang   +3 more
core   +1 more source

Optimizing Memory Efficiency for Convolution Kernels on Kepler GPUs

open access: yes, 2017
Convolution is a fundamental operation in many applications, such as computer vision, natural language processing, image processing, etc. Recent successes of convolutional neural networks in various deep learning applications put even higher demand on ...
Chen, Danny Z.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy