Results 51 to 60 of about 400,990 (266)

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Optimizing Test Pattern Compaction with Boolean Satisfiability Attack

open access: yesChips
Test time per chip plays an essential role in manufacturing tests. Keeping a low number of test patterns becomes one of the prime objectives in concurrence with achieving the desired fault coverage.
Yadi Zhong
doaj   +1 more source

Safety Analysis of a Certifiable Air Data System Based on Synthetic Sensors for Flow Angle Estimation

open access: yesApplied Sciences, 2021
This work deals with the safety analysis of an air data system (ADS) partially based on synthetic sensors. The ADS is designed for the small aircraft transportation (SAT) community and is suitable for future unmanned aerial vehicles and urban air ...
Angelo Lerro, Manuela Battipede
doaj   +1 more source

Spartan Daily, September 14, 2006 [PDF]

open access: yes, 2006
Volume 127, Issue 11https://scholarworks.sjsu.edu/spartandaily/10269/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

open access: yesIEEE Access, 2020
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks,
Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
doaj   +1 more source

A SAT Attack on Rota’s Basis Conjecture

open access: yes, 2022
The SAT modulo Symmetries (SMS) is a recently introduced framework for dynamic symmetry breaking in SAT instances. It combines a CDCL SAT solver with an external lexicographic minimality checking algorithm. We extend SMS from graphs to matroids and use it to progress on Rota’s Basis Conjecture (1989), which states that one can always decompose a ...
Kirchweger, Markus   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy