Results 61 to 70 of about 1,874,765 (275)

Pengaruh Industri Multi Level Marketing (MLM) terhadap Peningkatan Jiwa Kewirausahaan Mahasiswa dan Masyarakat [PDF]

open access: yes, 2008
This research aims to 1) analyze the influence of Multi Level Marketing Industrytoward the upgrading of the students' entrepreneurship interest and spirit, 2) describethe steps carried out in improving the image toward Multi Level Marketing, and 3 ...
Murhadi, D. R. (Deasy)
core  

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Few-shot segmentation based on multi-level and cross-scale clustering

open access: yesConnection Science
The problem of image segmentation with few-shot learning is addressed in this paper, which is a challenging task due to the lack of sufficient high-precision annotated data.
Shuai Yuan   +4 more
doaj   +1 more source

Social Aspects of Health Communication – Towards a Research Agenda

open access: yesEuropean Journal of Health Communication (EJHC), 2021
Health and health-related behaviours are embedded in social contexts in various ways which comprise both risks and opportunities for health communication.
Sarah Geber   +2 more
doaj   +1 more source

Multi-level algorithms for modularity clustering [PDF]

open access: yes, 2008
Modularity is one of the most widely used quality measures for graph clusterings. Maximizing modularity is NP-hard, and the runtime of exact algorithms is prohibitive for large graphs.
Noack, Andreas, Rotta, Randolf
core  

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

An Information Integration Technology for Safety Assessment on Civil Airborne System

open access: yesAerospace
With the significant expansion of civil aviation, particularly in the low-altitude economy, there is a significant gap between the escalating demand for airworthiness certification of novel aircraft designs, such as electric vertical take-off and landing
Xi Chen, Quan Zou, Jie Bai, Lei Dong
doaj   +1 more source

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

One-Hot Multi-Level Leaky Integrate-and-Fire Spiking Neural Networks for Enhanced Accuracy-Latency Tradeoff

open access: yesIEEE Access
Spiking neural networks (SNNs) hold significant promise as energy-efficient alternatives to conventional artificial neural networks (ANNs). However, SNNs require computations across multiple timesteps, resulting in increased latency, heightened energy ...
Pierre Abillama   +6 more
doaj   +1 more source

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy