Results 41 to 50 of about 1,590,465 (281)
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity.
Yomna Mokhtar Ibrahim +3 more
doaj +1 more source
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y. +3 more
core +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
HRaccoon: A High-performance Configurable SCA Resilient Raccoon Hardware Accelerator
The lattice-based Raccoon scheme is one of the candidates in Round 1 of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) additional digital signatures standardization process.
Ziying Ni +4 more
doaj +1 more source
Improving Side-Channel Analysis Through Semi-supervised Learning [PDF]
The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security evaluator (i.e., attacker) gains access to a profiling device to build a precise model which is used to attack another device in the attacking phase.
Picek, Stjepan +4 more
openaire +3 more sources
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Quantitative approaches to linguistic variation in IRC : implications for qualitative research [PDF]
Qualitative analysis of code choice, code switching, and language style in Internet Relay Chat (IRC) can shed light on functional-pragmatic aspects of the use of different linguistic varieties.
Siebenhaar, Beat
core
We investigate controlled phase separation of a binary Bose-Einstein condensate (BEC) in the proximity of mixed-spin-channel Feshbach resonance in the |F = 1, mF = +1> and |F = 2,mF = -1> states of 87Rb at a magnetic field of 9.10 G.
Hayashi, Taro +5 more
core +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source

