Results 51 to 60 of about 50,028 (274)

Ketogenic Diet as an Epigenetic Therapy in SETD1B‐Related Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Histone lysine methyltransferases such as SETD1B regulate chromatin structure and gene transcription. Ketone bodies, including butyrate, act as histone deacetylase inhibitors. We report a 4‐year‐old boy with SETD1B‐related absence epilepsy, refractory to conventional medications, who achieved sustained > 90% seizure reduction on the Modified ...
Erica Tsang   +10 more
wiley   +1 more source

Key Generation for Hardware Obfuscation Using Strong PUFs

open access: yesCryptography, 2019
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir   +1 more
doaj   +1 more source

Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges

open access: yesAdvanced Functional Materials, EarlyView.
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley   +1 more source

Assembly of Cell‐Seeded 3D Printed Hydrogel Modules with Perfusable Channel Networks

open access: yesAdvanced Functional Materials, EarlyView.
Macroscale assembly was utilized to prepare perfusable tissue constructs from individually 3D printed hydrogel modules with embedded branched channel networks and port arrays for cell seeding. Novel multi‐material bioreactors were fabricated to facilitate the gluing of individual modules and the perfusion culture of assembled modular constructs seeded ...
Zachary J. Geffert   +10 more
wiley   +1 more source

Titanium Suboxides Responsible for Electronic Anomaly Near Room Temperature in the Ti3C2Tx MXene

open access: yesAdvanced Functional Materials, EarlyView.
Our multi‐technique study reveals that the near‐room‐temperature anomaly in Ti3C2Tx MXene is linked to titanium suboxide nanodomains, including Ti3O5, embedded within the MXene host. Their temperature‐driven transformation provides an alternative explanation to solvent‐ and swelling‐based models and offers new insight into the thermally activated ...
Bence G. Márkus   +8 more
wiley   +1 more source

Research on construction of conditional exception code used in branch obfuscation

open access: yes网络与信息安全学报, 2020
Using conditional exception code construction and exception handler to replace conditional jump code,the branch obfuscation get the right branch selection,but the address of branch point was concealed,so this obfuscation method can defeat symbolic ...
Pu GENG, Yuefei ZHU
doaj   +3 more sources

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy