Results 61 to 70 of about 268,099 (291)

A Stevedore's protein knot. [PDF]

open access: yesPLoS Computational Biology, 2010
Protein knots, mostly regarded as intriguing oddities, are gradually being recognized as significant structural motifs. Seven distinctly knotted folds have already been identified. It is by and large unclear how these exceptional structures actually fold,
Daniel Bölinger   +6 more
doaj   +1 more source

Statistical Watermarking for Networked Control Systems

open access: yes, 2017
Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal.
abrams   +8 more
core   +1 more source

Bounded Reachability for Temporal Logic over Constraint Systems [PDF]

open access: yes, 2010
We present CLTLB(D), an extension of PLTLB (PLTL with both past and future operators) augmented with atomic formulae built over a constraint system D. Even for decidable constraint systems, satisfiability and Model Checking problem of such logic can be ...
Bersani, Marcello M.   +5 more
core   +2 more sources

Structural insights into an engineered feruloyl esterase with improved MHET degrading properties

open access: yesFEBS Letters, EarlyView.
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa   +5 more
wiley   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

A Case of Milk-Alkali Syndrome Caused by Diuretic-Induced Alkalosis and Polypharmacy

open access: yesMedicina, 2023
Milk-alkali syndrome, which is characterized by hypercalcemia, metabolic alkalosis, and renal dysfunction, typically results from the ingestion of large amounts of calcium and absorbable alkaline products.
Naoya Mizutani   +2 more
doaj   +1 more source

Pabble: parameterised Scribble [PDF]

open access: yes, 2014
© 2014, The Author(s).Many parallel and distributed message-passing programs are written in a parametric way over available resources, in particular the number of nodes and their topologies, so that a single parallel program can scale over different ...
Ng, N, Yoshida, N
core   +1 more source

Model Checking Software via Abstraction of Loop Transitions [PDF]

open access: yes, 2003
This paper reports a data abstraction algorithm that is targeted to minimize the contribution of the loop executions to the program state space. The loop abstraction is defined as the syntactic program transformation that results in the sound representation of the concrete program.
Natasha Sharygina, James C. Browne
openaire   +1 more source

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Controller Cyber-Attack Detection and Isolation

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively
Anna Sztyber-Betley   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy