Results 81 to 90 of about 536,772 (338)

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Material Factors in Relation to Development Time in Liquid-Penetrant Inspection. Part 2. Investigation Programme and Preliminary Tests

open access: yesArchives of Metallurgy and Materials, 2016
The paper is the continuation of the previous one entitled “Material factors in relation to development time in liquid-penetrant inspection. Part 1. Material factors” in which the material factors influencing essentially the development time in penetrant
Irek P., Słania J.
doaj   +1 more source

The planar cell polarity protein Vangl2 interacts with the PDZ‐domains of Scribble but not with a unique PDZ‐like domain in Inturned

open access: yesFEBS Letters, EarlyView.
Structural and biochemical characterisations show that the planar cell polarity (PCP) protein Inturned harbours a unique PDZ‐like domain that does not bind canonical PDZ‐binding motifs (PBMs) like that of another PCP protein Vangl2. In contrast, the apical‐basal polarity protein Scribble contains four PDZ domains that bind Vangl2, but one PDZ domain ...
Stephan Wilmes   +4 more
wiley   +1 more source

Blade Sharpness and its Effect on the Testing of Body Armours [PDF]

open access: yes, 2002
Factors such as edge sharpness and tip sharpness have been identified by Horsfall,1 as keyvariables in the testing of stab and slash resistant armours.
Champion, Stephen M.   +3 more
core  

Automated soil hardness testing machine [PDF]

open access: yes, 2007
This paper describes the design and performance of a mechatronic system for controlling a standard drop-hammer mechanism that is commonly used in performing outdoor soil or ground hardness tests. A low-cost microcontroller is used to control a hydraulic
Cubero, Samuel N.   +1 more
core   +2 more sources

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Calpain small subunit homodimerization is robust and calcium‐independent

open access: yesFEBS Letters, EarlyView.
Calpains dimerize via penta‐EF‐hand (PEF) domains. Using single‐molecule force spectroscopy, we measured the strength and kinetics of PEF–PEF homodimer binding. The interaction is robust, shows a transient conformational step before dissociation, and remains largely insensitive to Ca2+.
Nesha May O. Andoy   +4 more
wiley   +1 more source

Structural insights into an engineered feruloyl esterase with improved MHET degrading properties

open access: yesFEBS Letters, EarlyView.
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa   +5 more
wiley   +1 more source

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +1 more source

Compiling symbolic attacks to protocol implementation tests

open access: yes, 2012
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy