Results 61 to 70 of about 298,366 (295)

Nuclear pore links Fob1‐dependent rDNA damage relocation to lifespan control

open access: yesFEBS Open Bio, EarlyView.
Damaged rDNA accumulates at a specific perinuclear interface that couples nucleolar escape with nuclear envelope association. Nuclear pores at this site help inhibit Fob1‐induced rDNA instability. This spatial organization of damage handling supports a functional link between nuclear architecture, rDNA stability, and replicative lifespan in yeast.
Yamato Okada   +5 more
wiley   +1 more source

Bioinspired building structural conceptual design by graphic static and layout optimization: a case study of human femur structure

open access: yesJournal of Asian Architecture and Building Engineering, 2022
This paper introduces a bioinspired structure design method in the conceptual stage and takes the human femur section as an example, to extract the structural principle from the natural form, and summarizes as the morphological operation rules.
Yuchi Shen, Yan Liu
doaj   +1 more source

An Introduction to Deep Morphological Networks

open access: yesIEEE Access, 2021
Over the past decade, Convolutional Networks (ConvNets) have renewed the perspectives of the research and industrial communities. Although this deep learning technique may be composed of multiple layers, its core operation is the convolution, an ...
Keiller Nogueira   +3 more
doaj   +1 more source

Airborne LiDAR for DEM generation: some critical issues [PDF]

open access: yes, 2008
Airborne LiDAR is one of the most effective and reliable means of terrain data collection. Using LiDAR data for DEM generation is becoming a standard practice in spatial related areas.
Liu, Xiaoye
core   +2 more sources

Anchorage‐independent and faster growth in clonal population from UV‐irradiated NER‐deficient cells

open access: yesFEBS Open Bio, EarlyView.
UV‐irradiated cells expressing a DDB2 mutant protein unable to interact with PCNA (DDB2PCNA‐) form clones able to grow without anchorage. Different experimental approaches reveal heterogeneity in cell cycle regulation and drug response within these clones, emphasizing the crucial role of the DDB2‐PCNA interaction in preventing cellular transformation ...
Paola Perucca   +6 more
wiley   +1 more source

RSA Cryptographic Key Generation Using Fingerprint Minutiae

open access: yesIraqi Journal for Computers and Informatics, 2014
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce ...
Mofeed Rashid, Huda Zaki
doaj   +1 more source

Morphological justification of laparoscopic transabdominal preperitoneal (TAPP) operation for the inguinal hernia recurrence

open access: yesJournal of Education, Health and Sport, 2020
Introduction. The frequency of the inguinal hernia of the repeated recurrences is up from 9,3  to 12%. In surgical treatment re-fixation of the mesh to the atrophied tissues of the inguinal canal is unreliable.
Y. P. Feleshtynskyi, A. A. Shtaier
doaj   +1 more source

Capturing, classification and concept generation for automated maintenance tasks [PDF]

open access: yes, 2014
Maintenance is an efficient and cost effective way to keep the function of the product available during the product lifecycle. Automating maintenance may drive down costs and improve performance time; however capturing the necessary information required ...
Farnsworth, Michael, Tomiyama, Tetsuo
core   +1 more source

Derivation and characterization of retinal pigment epithelium from urine‐derived iPSCs

open access: yesFEBS Open Bio, EarlyView.
Age‐related macular degeneration causes vision loss via RPE dysfunction and loss. Traditional iPSC therapies rely on invasive biopsies, limiting scalability. Here, we utilize urine‐derived stem cells as an accessible source to generate u‐iPSCs, successfully differentiated into pigmented RPE. This “Urine‐to‐Retina” platform provides a promising path for
Daniella Beiner   +7 more
wiley   +1 more source

Cryptographic key Generation Using Fingerprint Biometrics

open access: yesمجلة علوم ذي قار, 2019
At the present time progress of communications technologies has resulted to post large amounts of digital data in the media shared among the people, this has necessitated the development of cryptographic techniques to be one of the building blocks for ...
Huda Ameer
doaj   +4 more sources

Home - About - Disclaimer - Privacy