Results 71 to 80 of about 1,063,820 (299)

An upstream open reading frame regulates expression of the mitochondrial protein Slm35 and mitophagy flux

open access: yesFEBS Letters, EarlyView.
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva   +5 more
wiley   +1 more source

Analogue models for FRW cosmologies

open access: yes, 2003
It is by now well known that various condensed matter systems may be used to mimic many of the kinematic aspects of general relativity, and in particular of curved-spacetime quantum field theory.
Barcelo, Carlos   +2 more
core   +2 more sources

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Comparing multiple statistical software for multiple-indicator, multiple-cause modeling: an application of gender disparity in adult cognitive functioning using MIDUS II dataset

open access: yesBMC Medical Research Methodology, 2020
Background The multiple-indicator, multiple-cause model (MIMIC) incorporates covariates of interest in the factor analysis. It is a special case of structural equation modeling (SEM), which is modeled under latent variable framework.
Chi Chang   +3 more
doaj   +1 more source

Validation of a Mimic Heart Failure Model

open access: yesJournal of Arrhythmia, 2011
Introduction: Animal models which mimic the clinical characteristics of heart failure (HF) with dyssynchrony play a critical role in development of new therapies. Existing HF animal models created by left bundle branch block (LBBB), rapid pacing, or microembolization alone or in combinations only mimic partial HF characteristics and are time-costuming ...
Ping Yang   +4 more
openaire   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Machine learning-based prediction model of acute kidney injury in patients with acute respiratory distress syndrome

open access: yesBMC Pulmonary Medicine, 2023
Background Acute kidney injury (AKI) can make cases of acute respiratory distress syndrome (ARDS) more complex, and the combination of the two can significantly worsen the prognosis.
Shuxing Wei   +7 more
doaj   +1 more source

Analysis of reinforcement learning strategies for predation in a mimic-model prey environment [PDF]

open access: yes, 2005
In this paper we propose a mathematical learning model for a stochastic automaton simulating the behaviour of a predator operating in a random environment occupied by two types of prey: palatable mimics and unpalatable models.
Tsoularis, A., Wallace, J.
core  

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Method against process control-flow hijacking based on mimic defense

open access: yesTongxin xuebao, 2021
To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the ...
Chuanxing PAN   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy