Results 61 to 70 of about 3,619,342 (339)
Attentional control and engagement with digital technology [PDF]
Multiple demands comprise the efficiency of attentional control. There is abundant evidence that when an individual attempts two or more attentionally demanding activities at the same time, the allocation of attention to the tasks is limited and ...
Ross Alloway, Tracy Alloway
core +1 more source
Beamforming Techniques for Large-N Aperture Arrays
Beamforming is central to the processing function of all phased arrays and becomes particularly challenging with a large number of antenna element (e.g. >100,000).
Adami, K Zarb +4 more
core +1 more source
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source
Digital Media Application Technology of Mobile Terminals Based on Edge Computing and Virtual Reality [PDF]
Tao Jiang
openalex +1 more source
HDAC4 is degraded by the E3 ligase FBXW7. In colorectal cancer, FBXW7 mutations prevent HDAC4 degradation, leading to oxaliplatin resistance. Forced degradation of HDAC4 using a PROTAC compound restores drug sensitivity by resetting the super‐enhancer landscape, reprogramming the epigenetic state of FBXW7‐mutated cells to resemble oxaliplatin ...
Vanessa Tolotto +13 more
wiley +1 more source
Exploring digital encounters in the city [PDF]
In this paper we explore the types of encounters that technology enables. We consider the differences between digital and non-digital encounters, and investigate how technology can be appropriated for shared interactions that support conscious (or ...
Fatah gen. Schieck, A., Kostakos, V.
core
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti +8 more
core +1 more source
Taking time to understand: articulating relationships between technologies and organizations [PDF]
Dynamic relationships between technologies and organizations are investigated through research on digital visualization technologies and their use in the construction sector.
Whyte, Jennifer
core +1 more source
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto +8 more
wiley +1 more source
Digital literacy in religious studies [PDF]
This article considers the relevance of the concept of ‘digital literacy’ within the context of the discipline of religious studies in higher education and reflects on its potential impact on notions of ‘graduateness’.
Sinclair, Stefanie
core

