Results 101 to 110 of about 5,471,834 (312)
A Biologically-Based Computational Approach to Drug Repurposing for Anthrax Infection
Developing drugs to treat the toxic effects of lethal toxin (LT) and edema toxin (ET) produced by B. anthracis is of global interest. We utilized a computational approach to score 474 drugs/compounds for their ability to reverse the toxic effects of ...
Jane P. F. Bai +2 more
doaj +1 more source
Merging enzymatic and synthetic chemistry with computational synthesis planning [PDF]
Itai Levin +3 more
openalex +1 more source
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
Computation vs. Information Processing: Why Their Difference Matters to Cognitive Science [PDF]
Since the cognitive revolution, it’s become commonplace that cognition involves both computation and information processing. Is this one claim or two? Is computation the same as information processing?
Piccinini, Dr. Gualtiero +1 more
core
Why emerging leaders should focus on being good postdoctoral supervisors
Swamped with work and suddenly a new student is waiting at your doorstep for supervision? Great—this is your chance! In this article, we share tips on how postdocs can strengthen their leadership skills while supervising students. This image has been created using DALL·E. Many postdocs work as leaders later in their career.
Hannah Rostalski +5 more
wiley +1 more source
Engineering Analysis of CMS Casing
In the article the methodological requirements that are indispensable for the implementation of construction documents for the production and operation of developed structures and facilities in order to support the transition of products into commodities
L.V. Larchenkov +2 more
doaj
This paper introduces a new encryption method aimed at improving the cryptography process through the use of splitting radix Fourier Transform technique called Split-Radix Fast Fourier Transforms (SRFFT). The proposed method is based on splitting the FFT
Abdulle Hassan Mohamud
doaj +1 more source
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Sinc-Approximations of Fractional Operators: A Computing Approach
We discuss a new approach to represent fractional operators by Sinc approximation using convolution integrals. A spin off of the convolution representation is an effective inverse Laplace transform.
Gerd Baumann, Frank Stenger
doaj +1 more source
Recent progress in optoelectronic memristors for neuromorphic and in-memory computation [PDF]
Maria Pereira +4 more
openalex +1 more source

