Results 71 to 80 of about 355,842 (292)
Plasma membranes contain dynamic nanoscale domains that organize lipids and receptors. Because viruses operate at similar scales, this architecture shapes early infection steps, including attachment, receptor engagement, and entry. Using influenza A virus and HIV‐1 as examples, we highlight how receptor nanoclusters, multivalent glycan interactions ...
Jan Schlegel, Christian Sieben
wiley +1 more source
Synthesis and Characterization of Nano-crystalline ZSM-5 Zeolite
Nano-crystalline ZSM-5 zeolite was synthesized by hydrothermal method using chelating agent and two gel compositions:Compositionɪ:Al2O3:86SiO2:5.5TPA:12.7Na2O:3.4Trien:3320H2O.Compositionɪɪ:Al2O3:68SiO2:5.4TPA:10Na2O:2.6Trien:2626H2O.Study of ...
Najwa Saber Majeed +1 more
doaj +2 more sources
The silkworm, Bombyx mori, is reared on a large scale, mainly for silk production. The waste from this silk production, like pupae, is underused. As an edible insect, B. mori is a good source of protein in human food and animal feed.
Aline Marien +9 more
doaj +1 more source
ToAM: a task-oriented authentication model for UAVs based on blockchain
The pervasive cooperation of a group of UAVs has attracted increasing attention due to the reduced cost and widespread availability. When working in an untrusted or adversarial environment, the mutual authentication of UAVs in the cooperative process is ...
Aiguo Chen +5 more
doaj +1 more source
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang +8 more
wiley +1 more source
In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was ...
Yingjie XIA, Siyu ZHU, Xuejiao LIU
doaj +2 more sources
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross ...
Xuejiao LIU, Qiang ZHONG, Yingjie XIA
doaj +2 more sources
Mobile distributed authentication protocol [PDF]
Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised.
Alshahri, A., Irvine, J., Smith, D.G.
core
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
Negotiating Authentic Objects and Authentic Selves [PDF]
Our understanding of authenticity in the material world is characterized by a problematic dichotomy between materialist and constructivist perspectives. Neither explains why people find the issue of authenticity so compelling, nor how it is experienced and negotiated in practice. There is strong evidence supporting the view that prevailing materialist
openaire +2 more sources

