Results 71 to 80 of about 642,043 (327)

Lie Detection using functional MRI [PDF]

open access: yes, 2001
published_or_final_versio
Chan, CCH   +8 more
core  

CPT- and B-Violation: The p-pbar Sector

open access: yes, 2000
The CPT symmetry of relativistic quantum field theory requires the total lifetimes of particles and antiparticles be equal. Detection of pbar lifetime shorter than tau_p > O(10^32) yr would signal breakdown of CPT invariance, in combination with B ...
Bigi I. I.   +7 more
core   +1 more source

Maximum Angular Separation Epochs for Exoplanet Imaging Observations [PDF]

open access: yes, 2018
Direct imaging of exoplanets presents both significant challenges and significant gains. The advantages primarily lie in receiving emitted and, with future instruments, reflected photons at phase angles not accessible by other techniques, enabling the ...
Kane, Stephen R.   +2 more
core   +3 more sources

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

DDA-MSLD: A Multi-Feature Speech Lie Detection Algorithm Based on a Dual-Stream Deep Architecture

open access: yesInformation
Speech lie detection is a technique that analyzes speech signals in detail to determine whether a speaker is lying. It has significant application value and has attracted attention from various fields.
Pengfei Guo, Shucheng Huang, Mingxing Li
doaj   +1 more source

False Identity Detection Using Complex Sentences

open access: yesFrontiers in Psychology, 2018
The use of faked identities is a current issue for both physical and online security. In this paper, we test the differences between subjects who report their true identity and the ones who give fake identity responding to control, simple, and complex ...
Merylin Monaro   +4 more
doaj   +1 more source

The SED of the TeV BLLac 1ES 1426+428 after correction for the TeV--IR absorption [PDF]

open access: yes, 2003
The recent HEGRA detection and spectrum of 1ES 1426+428 at TeV energies, once corrected for absorption using present estimates of the diffuse extragalactic IR background, suggest that the high energy peak of the Spectral Energy Distribution (SED) could ...
Aharonian   +10 more
core   +3 more sources

Single‐molecule DNA flow‐stretch assays for high‐throughput DNA–protein interaction studies

open access: yesFEBS Open Bio, EarlyView.
We describe an optimised single‐molecule DNA flow‐stretch assay that visualises DNA–protein interactions in real time. Linear DNA fragments are tethered to a surface and stretched by buffer flow for fluorescence imaging. Using λ and φX174 DNA, this protocol enhances reproducibility and accessibility, providing a versatile approach for studying diverse ...
Ayush Kumar Ganguli   +8 more
wiley   +1 more source

Screening and epitope characterization of Nidogen‐2‐specific nanobodies

open access: yesFEBS Open Bio, EarlyView.
Camel immunization and phage display were employed to generate high‐affinity VHH nanobodies against Nidogen‐2. After library construction, biopanning, ELISA screening, sequencing, and recombinant expression, selected nanobodies were purified and characterized, leading to the preliminary exploration of a nanobody‐based sandwich ELISA for specific ...
Jianchuan Wen   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy