Results 151 to 160 of about 12,698,759 (344)

Automated FRAP microscopy for high‐throughput analysis of protein dynamics in chromatin organization and transcription

open access: yesFEBS Open Bio, EarlyView.
RoboMic is an automated confocal microscopy pipeline for high‐throughput functional imaging in living cells. Demonstrated with fluorescence recovery after photobleaching (FRAP), it integrates AI‐driven nuclear segmentation, ROI selection, bleaching, and analysis.
Selçuk Yavuz   +6 more
wiley   +1 more source

HISTORICAL AND ARCHAEOLOGICAL MODELING OF THE ALBAZIN FORT DURING THE SECOND SIEGE. III

open access: yesВестник Брянского государственного университета
In previous works, the authors presented 3D models of artillery bastions, a powder magazine and dugouts. However, for the most complete three-dimensional visualization of the Albaza fortress, it was necessary to develop three–dimensional models of its ...
Lokhov A.Yu.   +2 more
doaj   +1 more source

Engineering tandem VHHs to target different epitopes to enhance antibody‐dependent cell‐mediated cytotoxicity

open access: yesFEBS Open Bio, EarlyView.
Tandem VHH targeting distinct EGFR epitopes were engineered into a monovalent bispecific antibody (7D12‐EGA1‐Fc) with more potent ADCC without increasing affinity to EGFR. Structural modeling of 7D12‐EGA1‐Fc showed cross‐linking of separate EGFR domains to enhance CD16a engagement on NK cells.
Yuqiang Xu   +5 more
wiley   +1 more source

HISTORICAL AND TOPOGRAPHIC MODELING OF THE FIRST SIEGE OF THE ALBAZINSKY PRISON IN 1685. I

open access: yesВестник Брянского государственного университета
This work opens a series of articles, and is its first part, describing the first siege of the state Albazinsky prison that took place in June 1685. Although the siege itself did not last long in terms of duration, the available data from this event ...
Lokhov A.Y., Eremin I.E., Natsvin A.V.
doaj   +1 more source

On Higher-Order Cryptography

open access: yes, 2020
Type-two constructions abound in cryptography: adversaries for encryption and authentication schemes, if active, are modeled as algorithms having access to oracles, i.e. as second-order algorithms. But how about making cryptographic schemes themselves higher-order?
Barak B., Crubille R., Dal Lago U.
openaire   +4 more sources

Evaluation of in vitro toxicity of common phytochemicals included in weight loss supplements using 1H NMR spectroscopy

open access: yesFEBS Open Bio, EarlyView.
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy