Results 101 to 110 of about 2,058 (262)
The integration of renewable energy sources (RES), such as wind and solar energy, has become increasingly growth in power generation systems. However, the intermittent and variable nature of these sources poses challenges, especially in maintaining the ...
Tyas Kartika Sari +3 more
doaj +1 more source
Microbial metabolites in tumor epigenetic regulation
The gut microbiome modulates tumor epigenetic regulation through bioactive metabolites derived from dietary substrates. Microbiota‐produced SCFAs, secondary BAs, one‐carbon metabolites, and tryptophan‐derived ligands regulate histone acetylation, DNA methylation, and chromatin remodeling via HDAC, DNMT, AhR, and metabolic cofactor‐dependent pathways ...
Wangzheqi Zhang +31 more
wiley +1 more source
The graphical abstract illustrates the molecular mechanism by which chondroitin sulfate (DCS) alleviates glucocorticoid‐induced myopathy through the gut–muscle axis. DCS selectively enriches L. johnsonii Z‐RW, enhancing bshA‐encoded BSH activity to promote bile acid deconjugation and reduce the sugar–bile acid ratio, thereby re‐establishing intestinal ...
Ruiyun Wu +7 more
wiley +1 more source
Gradual volatile memristor–based artificial neurons with high uniformity for neuromorphic computing
Schematic of leaky integrate‐and‐fire artificial neurons for MNIST image classification. Abstract Artificial neurons are pivotal for neuromorphic hardware, but the development of compact and uniform devices remains challenging. Conventional volatile memristors suffer from abrupt switching, which hinders spatiotemporal consistency.
Pengtao Li +12 more
wiley +1 more source
Gut microbiome‐derived metabolites show promise in cancer research and therapy
The metabolites produced by the gut microbiome, which are subject to regulation by multiple factors, play a pivotal role in the progression of various types of cancer. These metabolites not only function as potential biomarkers for the early detection and monitoring of tumor development, but also actively participate in cancer therapeutic processes ...
Kangjie Yang +4 more
wiley +1 more source
ABSTRACT Balancing ecosystem‐service supply and demand is central to understanding both the natural and social dimensions of ecosystem services and to enhancing human well‐beings. Concurrently, collaborative efforts are underway to improve multiple ecosystem services, including the promotion of carbon neutrality and water purification (WP) within basin
Jing Cheng +5 more
wiley +1 more source
A Novel Crawling Robot Based on the Hexagonal Mesh Structure and Enhanced PID Control Strategy
ABSTRACT The locomotion of crawling robots is similar to that of caterpillars, relying on foot adhesion and body contraction to ensure flexible movement without compromising stability. However, most existing pneumatic soft crawling robots are incapable of simultaneously achieving forward, backward, turning, and climbing capabilities.
Meng Hongjun +4 more
wiley +1 more source
Highly Dynamic Soft Electrohydraulic Origami Actuators for Agile and Multimodal Robotic Locomotion
Most current soft robots still lag far behind their natural counterparts in both agility and speed, mainly attributed to the limited morphing modes and performance of soft actuators. Here, the authors report a new methodology of electrohydraulic origami (EHO) for creating powerful and multimodal soft actuators with large strain, high speed, lightweight,
Wenbo Li +6 more
wiley +1 more source
This review explores how mass spectrometry is transforming research in natural medicines, with Traditional Chinese medicine (TCM) as a primary exemplar. It details the application of advanced mass spectrometry in chemical analysis, the development of comprehensive quality control methods, and systematic research on the targeted mechanisms of single ...
Yudian Xu +7 more
wiley +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source

