Results 81 to 90 of about 5,357,769 (371)

Derivable maps and derivational points

open access: yesLinear Algebra and its Applications, 2012
AbstractFor an algebra A and an A-bimodule M, let L(A,M) be the set of all linear maps from A to M. A map δ∈L(A,M) is called derivable at C∈A if δ(A)B+Aδ(B)=δ(C), for all A,B∈A with AB=C. We call an element C∈A a derivational point of L(A,M) if ∀δ∈L(A,M) the condition δ is derivable at C implies δ is a derivation.
openaire   +2 more sources

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms

open access: yesFEBS Letters, EarlyView.
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze   +3 more
wiley   +1 more source

Tame-wild dichotomy for derived categories [PDF]

open access: yesarXiv, 2003
We prove that every finite dimensional algebra over an algebraically closed field is either derived tame or derived wild. The proof is based on the technique of matrix problems (boxes and reduction algorithm). It implies, in particular, that any degeneration of a derived wild algebra is derived wild; respectively, any deformation of a derived tame ...
arxiv  

The solution supramolecular structure of α2 → 8 polysialic acid suggests a structural cause for its low immunogenicity

open access: yesFEBS Letters, EarlyView.
α2 → 8 polysialic acid elicits poor immunogenicity. Small‐angle scattering shows a supramolecular structure with parallel‐chain binding, although in different forms at μm and mm calcium. The major histocompatibility complex requires molecular weights around 2000 Da to produce antibodies, and 2000 Da polysialic oligomers will bind in these structures ...
Kenneth A. Rubinson
wiley   +1 more source

Current progress in the derivation and therapeutic application of neural stem cells

open access: yesCell Death and Disease, 2017
Neural stem cells (NSCs) have a unique role in neural regeneration. Cell therapy based on NSC transplantation is a promising tool for the treatment of nervous system diseases.
Yuewen Tang, Pei Yu, Lin Cheng
semanticscholar   +1 more source

DERIVATIVES OF EUGENOL. [PDF]

open access: yesJournal of the American Chemical Society, 1897
n ...
Pond, F. J., Beers, F. T.
openaire   +2 more sources

Refining the NaV1.7 pharmacophore of a class of venom‐derived peptide inhibitors via a combination of in silico screening and rational engineering

open access: yesFEBS Letters, EarlyView.
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma   +8 more
wiley   +1 more source

The Dupire derivatives and Fréchet derivatives on continuous pathes [PDF]

open access: yesarXiv, 2013
In this paper, we study the relation between Fr\'echet derivatives and Dupire derivatives, in which the latter are recently introduced by Dupire [4]. After introducing the definition of Fr\'echet derivatives for non-anticipative functionals, we prove that the Dupire derivatives and the extended Fr\'echet derivatives are coherent on continuous pathes.
arxiv  

The scrypt Password-Based Key Derivation Function

open access: yesRequest for Comments, 2016
This document specifies the password-based key derivation function scrypt. The function derives one or more secret keys from a secret string. It is based on memory-hard functions, which offer added protection against attacks using custom hardware.
Colin Percival, S. Josefsson
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy