Results 81 to 90 of about 245,521 (284)

Using reversible computing to achieve fail-safety [PDF]

open access: yes, 1997
This paper describes a fail-safe design approach that can be used to achieve a high level of fail-safety with conventional computing equipment which may contain design flaws.
Bishop, P. G.
core  

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

SmartTags: IoT Product Passport for Circular Economy Based on Printed Sensors and Unique Item-Level Identifiers

open access: yesSensors, 2019
In this paper, we present a method that facilitates Internet of Things (IoT) for building a product passport and data exchange enabling the next stage of the circular economy. SmartTags based on printed sensors (i.e., using functional ink) and a modified
Nenad Gligoric   +8 more
doaj   +1 more source

Optimization of Clifford Circuits

open access: yes, 2013
We study optimal synthesis of Clifford circuits, and apply the results to peep-hole optimization of quantum circuits. We report optimal circuits for all Clifford operations with up to four inputs.
Kliuchnikov, Vadym, Maslov, Dmitri
core   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Reverse Engineering of Code

open access: yes, 2018
The ability to reverse engineer a product has been important for as long as technology has existed. A vital activity in most branches of industrial design and production has been to acquire samples of the products sold by competing companies and pick them apart.
openaire   +1 more source

RIPK4 function interferes with melanoma cell adhesion and metastasis

open access: yesMolecular Oncology, EarlyView.
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski   +9 more
wiley   +1 more source

Reality, Information, and Information Observer

open access: yesProceedings, 2020
Up to now both information and its connection to reality do not have scientifically conclusive definitions, nor implicit origin. They emerge in observing multiple impulses’ interactive yes‒no actions modeling information bits.
Vladimir S. Lerner
doaj   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

A Turbo-Detection Aided Serially Concatenated MPEG-4/TCM Videophone Transceiver

open access: yes, 2004
A Turbo-detection aided serially concatenated inner Trellis Coded Modulation (TCM) scheme is combined with four different outer codes, namely with a Reversible Variable Length Code (RVLC), a Non-Systematic Convolutional (NSC) code a Recursive Systematic ...
Chung, J. Y.   +3 more
core  

Home - About - Disclaimer - Privacy