Results 81 to 90 of about 1,254,731 (295)

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

RIPK4 function interferes with melanoma cell adhesion and metastasis

open access: yesMolecular Oncology, EarlyView.
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski   +9 more
wiley   +1 more source

Automated FRAP microscopy for high‐throughput analysis of protein dynamics in chromatin organization and transcription

open access: yesFEBS Open Bio, EarlyView.
RoboMic is an automated confocal microscopy pipeline for high‐throughput functional imaging in living cells. Demonstrated with fluorescence recovery after photobleaching (FRAP), it integrates AI‐driven nuclear segmentation, ROI selection, bleaching, and analysis.
Selçuk Yavuz   +6 more
wiley   +1 more source

Connecting Architecture With Structures [PDF]

open access: yes2008 Annual Conference & Exposition Proceedings, 2020
Comment: 9 ...
openaire   +2 more sources

Emergence of (bi)multi-partiteness in networks having inhibitory and excitatory couplings

open access: yes, 2015
(Bi)multi-partite interaction patterns are commonly observed in real world systems which have inhibitory and excitatory couplings. We hypothesize these structural interaction pattern to be stable and naturally arising in the course of evolution.
Dwivedi, Sanjiv K., Jalan, Sarika
core   +1 more source

Engineering tandem VHHs to target different epitopes to enhance antibody‐dependent cell‐mediated cytotoxicity

open access: yesFEBS Open Bio, EarlyView.
Tandem VHH targeting distinct EGFR epitopes were engineered into a monovalent bispecific antibody (7D12‐EGA1‐Fc) with more potent ADCC without increasing affinity to EGFR. Structural modeling of 7D12‐EGA1‐Fc showed cross‐linking of separate EGFR domains to enhance CD16a engagement on NK cells.
Yuqiang Xu   +5 more
wiley   +1 more source

The study of the mechanical properties of the porous gypsum

open access: yesBudownictwo i Architektura, 2015
The paper presents the laboratory test results of the mechanical properties of porous gypsum. Material for the study was obtained from gypsum Pro-Monta plate of 100mm thick.
Jakub Gontarz, Jerzy Podgórski
doaj   +1 more source

Didactic strategies for comprehension and learning of structural concepts

open access: yes, 2010
p. 926-937In previous papers we have established the convenience of formulating educational strategies at the university level for both disciplines: Civil Engineering and Architecture, which involves academic topics of mutual interest by means of ...
ABAD, Antonio   +4 more
core  

The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

open access: yes, 2019
Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed
Osagie, Amenze Joy   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy