Results 51 to 60 of about 413,253 (284)

LBS user location privacy protection scheme based on trajectory similarity

open access: yesScientific Reports, 2022
During the data set input or output, or the data set itself adds noise to enable data distortion to effectively reduce the risk of user privacy leakage.
Kun Qian, Xiaohui Li
doaj   +1 more source

The MICE luminosity monitor [PDF]

open access: yes, 2013
The MICE experiment will provide the first measurement of ionisation cooling, a technique suitable for reducing the transverse emittance of a tertiary muon beam in a future neutrino factory accelerator facility.
Dobbs, A., Forrest, D,, Soler, F.J.P.
core   +1 more source

Privacy in trajectory micro-data publishing : a survey

open access: yes, 2019
We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies.
Fiore, Marco   +9 more
openaire   +5 more sources

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Juan de Dios Romero y las prácticas editoriales del socialismo colombiano (1920-1934)

open access: yesHistoria Crítica, 2023
Objective/Context: The article proposes an analysis of the political trajectory and editorial activity of the Colombian socialist Juan de Dios Romero from 1920 to 1934.
Andrés Caro Peralta
doaj   +1 more source

Intelligent OFDM telecommunication system. Part 4. Anti-eavesdropping and anti-jamming properties of the system, based on many-parameter and fractional Fourier transforms [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter wavelet and Golay transforms (MPWT and MPGT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P.   +4 more
core   +1 more source

Structural insights into an engineered feruloyl esterase with improved MHET degrading properties

open access: yesFEBS Letters, EarlyView.
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa   +5 more
wiley   +1 more source

Organizing the interface—Plasma membrane architecture and receptor dynamics in virus‐cell interactions

open access: yesFEBS Letters, EarlyView.
Plasma membranes contain dynamic nanoscale domains that organize lipids and receptors. Because viruses operate at similar scales, this architecture shapes early infection steps, including attachment, receptor engagement, and entry. Using influenza A virus and HIV‐1 as examples, we highlight how receptor nanoclusters, multivalent glycan interactions ...
Jan Schlegel, Christian Sieben
wiley   +1 more source

FIRST experiment: Fragmentation of Ions Relevant for Space and Therapy [PDF]

open access: yes, 2013
Nuclear fragmentation processes are relevant in different fields of basic research and applied physics and are of particular interest for tumor therapy and for space radiation protection applications.
, M.   +17 more
core   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy