Results 41 to 50 of about 627,138 (286)

Effects of Coulomb interactions on the splitting of luminescence lines

open access: yes, 2004
We study the splitting between the right-hand and left-hand circularly polarized luminescence lines in a quantum dot under relatively weak confinement regime and resonant high-power excitation.
Augusto Gonzalez   +18 more
core   +1 more source

Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels [PDF]

open access: yes, 2017
In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized.
Amor, Selma Belhadj   +3 more
core   +3 more sources

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

False-Name Manipulation in Weighted Voting Games is Hard for Probabilistic Polynomial Time

open access: yes, 2013
False-name manipulation refers to the question of whether a player in a weighted voting game can increase her power by splitting into several players and distributing her weight among these false identities.
D. Felsenthal   +16 more
core   +1 more source

Matchings, squarefree powers, and Betti splittings

open access: yesIllinois Journal of Mathematics
New revised version following the referees ...
Crupi, Marilena   +2 more
openaire   +3 more sources

AAA+ protein unfoldases—the Moirai of the proteome

open access: yesFEBS Letters, EarlyView.
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley   +1 more source

Joint Resource Optimization for Cognitive Sensor Networks with SWIPT-Enabled Relay

open access: yesSensors, 2017
Energy-constrained wireless networks, such as wireless sensor networks (WSNs), are usually powered by fixed energy supplies (e.g., batteries), which limits the operation time of networks.
Weidang Lu   +4 more
doaj   +1 more source

A Rate-Splitting Based Bound-Approaching Transmission Scheme for the Two-User Symmetric Gaussian Interference Channel with Common Messages [PDF]

open access: yes, 2012
This paper is concerned with a rate-splitting based transmission strategy for the two-user symmetric Gaussian interference channel that contains common messages only.
Bai, B., Li, Y., Mao, L., Zhang, B.
core   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy