Results 71 to 80 of about 1,238,092 (290)
Examining the issues & challenges of email & e-communications. 2nd Northumbria Witness Seminar Conference, 24-25 Oct 2007 Northumbria University, Newcastle upon Tyne. [PDF]
These proceedings capture the content of the second Witness Seminar hosted by Northumbria University’s School of Computing, Engineering and Information Sciences.
Childs, Sue +4 more
core
Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva +10 more
wiley +1 more source
A hierarchy model on the research fields of cyberspace security technology
Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the
Bin-xing FANG
doaj +3 more sources
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li +2 more
wiley +1 more source
Explaining the AMST Model: Using Arts, Maths, Science, and Technology in an Upgraded Problem-Based Learning Approach [PDF]
Recent literature has touted the importance of the Science, Technology, Engineering, and Mathematics (STEM) curriculum model as the best way to develop a problem-based inquiry in the technology-rich, globally-connected 21st century learning environment ...
Georgia Daleure
doaj
Big Data and cloud computing: innovation opportunities and challenges
Big Data has emerged in the past few years as a new paradigm providing abundant data and opportunities to improve and/or enable research and decision-support applications with unprecedented value for digital earth applications including business ...
Chaowei Yang +4 more
doaj +1 more source
Digital, material and networked: some emerging themes for SET education [PDF]
Boundaries between the digital and material worlds are becoming blurred as the internet increasingly connects us to things as well as people and information.
Davies, Sarah-Jane +2 more
core
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson +7 more
wiley +1 more source
Meaning and Vision of Mimic Computing and Mimic Security Defense
To facilitate high-performance and high-security computing, a technology system based on mimic computing(MC)and mimic security defense(MSD)was proposed. The proposed system focused on both the multi-dimensional reconfigurable and functional architecture ...
Jiangxing Wu
doaj +2 more sources
Design and Realization of Brake System in Heavy Engineering Vehicle based on Web Theory
In order to solve the problems of the design and simulation analysis software portability and interoperability deficiencies of existing heavy engineering vehicle brake system,by using the Browser/Server and Client/Server hybrid structure,combined the JSP.
Ma Zhanbao, Wang Jing
doaj

