Results 41 to 50 of about 1,996,535 (294)
Robust Control of Autonomous Underwater Vehicles Using Delta-Sigma-Based 1-bit Controllers
Autonomous underwater vehicles (AUVs) are robots capable of operating underwater without the need for human operators. Nonetheless, there is the essential requirement of remote operation capability in case of exceptional situations, such as the encounter
Chathura Wanigasekara +2 more
doaj +1 more source
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel +13 more
wiley +1 more source
The higher the age and quality enhancement technology, the higher the level of knowledge of technology, with a number of associations hackers and expert coding for trying to duplicate a video game that has been produced by the creators in the form of ...
Robby Akhmad Surya Dilaga
doaj +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge +17 more
wiley +1 more source
Copyright Protection For Software [PDF]
The United States blazed the trail in giving copyright protection for software. Until just recently, many other countries favored sui generis protection for software, but that argument was finally settled in GATT/TRIPs and last December\u27s World ...
Oman, Ralph
core +1 more source
Brief announcement: passive and active attacks on audience response systems using software defined radios [PDF]
Audience response systems, also known as clickers, are used at many academic institutions to offer active learning environments. Since these systems are used to administer graded assignments, and sometimes even exams, it is crucial to assess their ...
Ewing, Ryan +3 more
core +1 more source
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns +10 more
wiley +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Estimation Method for Software Protection System based on Hardware Modules
This paper is told about a new method for estimating software protection systems based on hardware modules. It covers a new method for modeling software protection process.
T. V. Petrova, A. A. Krasnopevtsev
doaj

