Results 71 to 80 of about 8,038,703 (314)

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +1 more source

Semantic-Based Dynamic Service Adaptation in Context-Aware Mobile Cloud Learning

open access: yesCybernetics and Information Technologies, 2022
Self-adaptable system concerns on service adaptation whenever errors persist within the system. Changes in contextual information such as networks or sensors will affect the system’s effectiveness because the service adaptation process is not ...
Muhamad S.   +3 more
doaj   +1 more source

A Software Design System

open access: yes, 1980
© 1980 California Institute of Technology. I wish to thank Dr. Frederick B. Thompson for his patient guidance and help during my graduate studies at Caltech.
openaire   +2 more sources

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Original hardware-software method for treatment of infected superficial wounds in a liquid environment

open access: yesRussian Open Medical Journal, 2019
Aim ― development of a hardware-software system allowing to treat infected superficial wounds in a liquid environment, designed to provide continuous flow of various irrigation solutions (depending on the wound healing stage) under airtight and water ...
Alexandr A. Basov   +4 more
doaj   +1 more source

Software system safety [PDF]

open access: yes
Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of
Uber, James G.
core   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

APPLICATION OF COMPUTER TECHNOLOGIES IN TEACHING OF MEDICAL STUDENTS

open access: yesБюллетень сибирской медицины, 2014
he purpose of the given research are situational tasks from the point of view of algorithms of their decision and application of computer technologies for realization of similar algorithms.
O. V. Vorobeichikova
doaj   +1 more source

Misalignment estimation software system [PDF]

open access: yes
A system of computer software, spacecraft, and ground system activity is described that enables spacecraft startrackers and inertial assemblies to be aligned and calibrated from the ground after the spacecraft has achieved orbit.
Desjardins, R. L.
core   +1 more source

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy