Results 91 to 100 of about 552,177 (296)

Single‐molecule DNA flow‐stretch assays for high‐throughput DNA–protein interaction studies

open access: yesFEBS Open Bio, EarlyView.
We describe an optimised single‐molecule DNA flow‐stretch assay that visualises DNA–protein interactions in real time. Linear DNA fragments are tethered to a surface and stretched by buffer flow for fluorescence imaging. Using λ and φX174 DNA, this protocol enhances reproducibility and accessibility, providing a versatile approach for studying diverse ...
Ayush Kumar Ganguli   +8 more
wiley   +1 more source

Chameleon sequences reveal structural effects in proteins representing micelle‐like distribution of hydrophobicity

open access: yesFEBS Open Bio, EarlyView.
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman   +4 more
wiley   +1 more source

Iron homeostasis disruption and lipid peroxidation in skeletal muscle during short‐term immobilization

open access: yesFEBS Open Bio, EarlyView.
14‐day casting‐induced immobilization reduced gastrocnemius muscle mass and increased non‐heme iron and ferritin heavy chain levels. Despite iron accumulation, transferrin receptor 1 and iron regulatory protein 2 were paradoxically upregulated. Lipid peroxidation was elevated without compensatory antioxidant responses.
Haruka Yokogawa   +2 more
wiley   +1 more source

Money in Monetary Policy Design under Uncertainty: A Formal Characterization of ECB-Style Cross-Checking [PDF]

open access: yes
The European Central Bank has assigned a special role to money in its two pillar strategy and has received much criticism for this decision. The case against including money in the central bank’s interest rate rule is based on a standard model of the ...
Guenter W. Beck, Volker Wieland
core  

Using dynamic binary analysis for tracking pointer data [PDF]

open access: yes, 2014
The examination and monitoring of binaries during runtime, referred to as dynamic binary analysis, is a widely adopted approach, especially in the field of security and software vulnerabilities.
Computer Science Annual Workshop CSAW’14   +2 more
core  

Identifying transcription factors controlling the basal expression of human MRP4 highlights a substantial role for Sp1

open access: yesFEBS Open Bio, EarlyView.
The MRP4 transporter exports several drugs and signaling molecules. Here, we identified key promoter elements regulating basal MRP4 expression. Using reporter assays, we defined a conserved region with essential Sp1 and contributory Ets sites, which controlled basal MRP4 expression.
Debora Singer   +7 more
wiley   +1 more source

A Hybrid Approach for Reachability Analysis of Complex Software Systems Using Fuzzy Adaptive Particle Swarm Optimization Algorithm and Rule Composition

open access: yesMathematical and Computational Applications
Model checking has become a widely used and precise technique for verifying software systems. However, a major challenge in model checking is state space explosion, which occurs due to the exponential memory usage required by the model checker.
Nahid Salimi   +3 more
doaj   +1 more source

Cross-checking optimal monetary policy with information from the Taylor rule [PDF]

open access: yes, 2011
This paper shows that monetary policy should be delegated to a central bank that cross-checks optimal policy with information from the Taylor rule. Attaching some weight to deviations of the interest rate from the interest rate prescribed by the Taylor ...
Tillmann, Peter
core  

Optimizing photoactivation of PA‐mCherry for optical pooled CRISPR screens

open access: yesFEBS Open Bio, EarlyView.
Photoactivatable PA‐mCherry finds widespread use to optically tag individual cells. However, confocal 405 nm UV laser‐scanning (normal scan) is much less efficient than widefield UV illumination, limiting the use of PA‐mCherry on confocal instruments. We remedy this limitation by reporting that rapid and repeated confocal scanning with a low‐intensity,
Sravasti Mukherjee   +3 more
wiley   +1 more source

The Nature of Retrograde Analysis for Chinese Chess [PDF]

open access: yes, 2006
Retrograde analysis has been successfully applied to solve Awari and construct 6-piece Western chess endgame databases. However, its application to Chinese chess is limited because of the special rules about indefinite move sequences.
Fang, Haw-ren
core  

Home - About - Disclaimer - Privacy