Results 51 to 60 of about 1,996,535 (294)
Control system for a superconducting rectifier using a microcomputer [PDF]
Within the scope of a research program of superconducting rectifiers software is being developed to take care of the control of such systems. The hard-ware architecture which interferes with the in and output signals is based on a LSI-11/2 microprocessor
Caspari, Meindert +4 more
core +4 more sources
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
SOFTWARE APPLICATIONS FOR MOBILE AND MOBILE PROTECTION [PDF]
One of the most interesting hipothesys launched in the software industries reveals the following: software applications modify intentions, consumer behavior and all related to the motivation.
Ştefan IOVAN, Cristian IVĂNUŞ
doaj
Efficient Memory-Protected Integration of Add-On Software Subsystems in Small Embedded Automotive Applications [PDF]
Current innovations in the automotive industry evolve mainly in the electronics and software domain. This leads to an increasing integration of additional software subsystems into already existing electronic control units (ECUs) to cope with the ...
Khan, A, Schäfer, A, Zetlmeisl, M
core +1 more source
Internationally, copyright protection is the most extensively utilized legal protection model for software. Software is protected under copyright law since it is a sort of "work." Because the requirements to qualify as works under copyright laws are not stringent, just formal creativity is required.
openaire +1 more source
COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
The Analysis of Software Protectors
This article presents an overview of software products designed to protect software against unauthorized copying or protectors. The author analyses advantages and disadvantages of popular protectors and also covers new tendencies, technologies and ...
V. A. Bukasov
doaj
Grounding transient response of lightning protection GTIERRAS software
A computer program developed in Matlab (GTIERRAS) from an electromagneticbased model is used to assess grounding impedances and the behavior of grounding electrodes of arbitrary shapes under lightning impulses. Impedance, currents and voltages, or other
Héctor David Gómez Montoya +3 more
doaj +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source

