Results 51 to 60 of about 21,953 (219)

The Role of Chemistry Across Disciplines From Humanities to Life Sciences in Understanding Complexity and Emergence

open access: yesAngewandte Chemie, EarlyView.
This study explores the origins of life by linking prebiotic chemistry, the emergence of information‐carrying molecules such as RNA and proteins, and philosophical questions about consciousness. The study emphasizes the role of molecular evolution in the Central Dogma and provides insights into the chemical origins of biology and the basis of life's ...
Harald Schwalbe   +5 more
wiley   +2 more sources

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

IMPLEMENTASI TEKNIK OBFUSCATION PADA SOURCE CODE PHP DENGAN ALGORITMA RIVEST CIPHER 4

open access: yessemanTIK, 2020
Aplikasi web merupakan suatu aplikasi dengan konsep client server yang dapat membentuk halaman-halaman website berdasarkan permintaan pengguna. Salah satu teknologi open source yang sangat banyak digunakan untuk membangun website adalah PHP. Sayangnya aplikasi website dengan teknologi open source berbasis PHP harus didistribusikan dalam bentuk source ...
Ramadhan, Artono Dwi   +2 more
openaire   +2 more sources

Context‐Dependent Role of GDF15: GDF15+ Tumor‐Associated Macrophages Suppress OSCC Progression by Enhancing Phagocytosis

open access: yesAdvanced Science, EarlyView.
This study identifies GDF15+ TAMs as a cell subset mediating tumor regression after immunotherapy. Macrophage‐intrinsic GDF15 enhances phagocytosis and antigen cross‐presentation to CD8+ T cells through the NF‐κB signaling pathway, thereby inhibiting tumor progression.
Xinyu Zhou   +9 more
wiley   +1 more source

Diversified Compilation Method Based on LLVM [PDF]

open access: yesJisuanji gongcheng
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj   +1 more source

Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor

open access: yesAdvanced Science, EarlyView.
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang   +4 more
wiley   +1 more source

Superradiance and Broadband Emission Driving Fast Electron Dephasing in Open Quantum Systems

open access: yesAdvanced Science, EarlyView.
We uncover the physical origin of ultrafast electron dephasing in solid‐state high‐harmonic generation by simulating the Lindblad equation for the dissipative Hubbard model. Coexistence of Dicke superradiance and broadband emission is revealed, whose destructive interference shortens the effective scattering time and provides a unified picture of ...
Gimin Bae, Youngjae Kim, Jae Dong Lee
wiley   +1 more source

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, EarlyView.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques [PDF]

open access: yesEmpirical Software Engineering, 2013
Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical. Although code understanding cannot be completely impeded, code obfuscation makes it more laborious and troublesome, so as to discourage or retard code tampering.
Mariano Ceccato   +5 more
openaire   +5 more sources

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy