Results 61 to 70 of about 1,297,971 (299)
Chedar: peer-to-peer middleware [PDF]
In this paper we present a new peer-to-peer (P2P) middleware called CHEap Distributed ARchitecture (Chedar). Chedar is totally decentralized and can be used as a basis for P2P applications. Chedar tries to continuously optimize its overlay network topology for maximum performance.
Auvinen, Annemari +4 more
openaire +2 more sources
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Symmetric and Synchronous Communication in Peer-to-Peer Networks [PDF]
Motivated by distributed implementations of game-theoretical algorithms, we study symmetric process systems and the problem of attaining common knowledge between processes.
Witzel, Andreas
core +7 more sources
The Micro, Small and Medium Enterprises Financing Based on Financial Technology
Financial technology innovations that are currently developing have provided convenience for the user community in the fields of financial systems, asset management to micro and small business (MSME) financing.
Ica Rika Candraningrat +4 more
doaj +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Detection of P2P Botnets Based on Support Vector Machine: Case Study [PDF]
Botnet is a general term referring to a group of automated software robots that run without human intervention (malware code). Nowadays, Botnets produces a major threat to the cyber security (Information Assurance) of computing assets.
Nemir Ahmed Al-Azzawi +1 more
doaj +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Tau acetylation at K331 has limited impact on tau pathology in vivo
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto +3 more
wiley +1 more source
Efficient and Effective Use of Peer Teaching for Medical Student Simulation
Simulation is increasingly used in medical education, promoting active learning and retention; however, increasing use also requires considerable instructor resources.
House, Joseph +5 more
doaj +1 more source

