Results 71 to 80 of about 8,038,703 (314)
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi +4 more
doaj +1 more source
Semantic-Based Dynamic Service Adaptation in Context-Aware Mobile Cloud Learning
Self-adaptable system concerns on service adaptation whenever errors persist within the system. Changes in contextual information such as networks or sensors will affect the system’s effectiveness because the service adaptation process is not ...
Muhamad S. +3 more
doaj +1 more source
© 1980 California Institute of Technology. I wish to thank Dr. Frederick B. Thompson for his patient guidance and help during my graduate studies at Caltech.
openaire +2 more sources
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source
Aim ― development of a hardware-software system allowing to treat infected superficial wounds in a liquid environment, designed to provide continuous flow of various irrigation solutions (depending on the wound healing stage) under airtight and water ...
Alexandr A. Basov +4 more
doaj +1 more source
Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of
Uber, James G.
core +1 more source
Peptide‐based ligand antagonists block a Vibrio cholerae adhesin
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang +9 more
wiley +1 more source
APPLICATION OF COMPUTER TECHNOLOGIES IN TEACHING OF MEDICAL STUDENTS
he purpose of the given research are situational tasks from the point of view of algorithms of their decision and application of computer technologies for realization of similar algorithms.
O. V. Vorobeichikova
doaj +1 more source
Misalignment estimation software system [PDF]
A system of computer software, spacecraft, and ground system activity is described that enables spacecraft startrackers and inertial assemblies to be aligned and calibrated from the ground after the spacecraft has achieved orbit.
Desjardins, R. L.
core +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source

