-
841
Neuraminidase 1 regulates neuropathogenesis by governing the cellular state of microglia via modulation of Trem2 sialylation
Published 2025-01-01“…Summary: Neuraminidase 1 (NEU1) cleaves terminal sialic acids from sialoglycoproteins in endolysosomes and at the plasma membrane. …”
Get full text
Article -
842
Pervasive glacier retreats across Svalbard from 1985 to 2023
Published 2025-01-01“…Abstract A major uncertainty in predicting the behaviour of marine-terminating glaciers is ice dynamics driven by non-linear calving front retreat, which is poorly understood and modelled. …”
Get full text
Article -
843
Exploring the Gating Mechanism of the Human Copper Transporter, hCtr1, Using EPR Spectroscopy
Published 2025-01-01“…In this study, we employed distance electron paramagnetic resonance to investigate the conformational changes of the extracellular N-terminal domain of full-length hCtr1, both in vitro and in cells, as a function of Cu(I) binding. …”
Get full text
Article -
844
User filtering based campus WLAN user clustering method
Published 2014-10-01“…With the widespread of smart terminals such as smart phones and smart pads,using MAC address as user identification in campus wireless local area network (WLAN) user clustering research cannot exactly represent user behavior.An user filtering based user clustering is proposed.This method filters users’ behavior data by their degree of activeness,and then further conducts clustering analysis of campus WLAN user behavior.The experimental result verifies the effectiveness of the proposed method.…”
Get full text
Article -
845
An Unusual Presentation of Metastatic Squamous Cell Cervical Carcinoma Involving the Distal Ileum Mimicking Crohn’s Disease
Published 1994-01-01“…Biopsies and subsequent laparotomy revealed that the lesions were metastatic cervical carcinoma involving the terminal ileum.…”
Get full text
Article -
846
The Realization of Interactive Television Services
Published 1995-01-01“…in this paper,the eminent role of CATV networks in the development of China’s Information Superhighway is pointed out,while limitted role will be revealed for the development of interactive television in telephone networks;the key techniques of terminal interactive services and bi-directional transmission of interactive services,as well as certain way of receiving(i.e.integrated receiver/decoder,IRD),are briefly introduced ;and possoble development of network structures and information working platforms,such as MPEG-2,are also discussed.…”
Get full text
Article -
847
Sodium‐Glucose Cotransporter 2 Inhibitors for Mesenchymal–Epithelial Transition Inhibitor‐Induced Edema
Published 2025-01-01“…In a patient with tepotinib‐induced edema and an N‐terminal pro‐brain natriuretic peptide (NTproBNP) level ≥ 300 pg/mL, the addition of empagliflozin to loop diuretics reduced the edema. …”
Get full text
Article -
848
FORMATION OF COSTS AND CALCULATION OF THE COST OF MAINTENANCE OF IMPLEMENTED LABORATORY MEDICAL EQUIPMENT
Published 2017-07-01“…In article questions of sectoral planning of costs of warranty repair of medical equipment and the equipment and also the repair made upon termination of warranty periods, their similarity and distinctions are investigated. …”
Get full text
Article -
849
The role of Pnut and its functional domains in Drosophila spermatogenesis
Published 2016-03-01“…Both GTPase domain and C-terminal domain mutant males were sterile and produced immotile sperm. …”
Get full text
Article -
850
Levels and associated factors for early cessation of EBF among under six month children in Ethiopia
Published 2024-12-01“…The estimated national rate of early termination of exclusive breastfeeding was 15.8% (95% CI: 14.11–17.66). …”
Get full text
Article -
851
Advancements in eco-friendly lead-free perovskite/Sb2Se3 tandem solar cells: TCAD simulations
Published 2025-01-01“…The research then transitions to evaluating the lead-free perovskite/Sb2Se3 system in a four-terminal (4-T) tandem, followed by optimization of the top cell to an n-i-p heterostructure for compatibility with a two-terminal (2-T) structure. …”
Get full text
Article -
852
Functional morphology of digestive organs of newborn calves and pathogenesis of escherichiosis
Published 2023-09-01“…As the condition developed, the range of pathological processes expanded and involved the structural organization of the rennet, small and large intestines, liver and pancreas. At the terminal stage of escherichiosis, deep inflammatory processes occurred not only in digestive organs, but also in other systems of diseased calves. …”
Get full text
Article -
853
Predicting accrual success for better clinical trial resource allocation
Published 2025-01-01“…Global data analyses of all terminated trials reported that 55% of trials were terminated due to low accrual rates. …”
Get full text
Article -
854
A Predicted Helix-Turn-Helix Core Is Critical for Bacteriophage Kil Peptide to Disrupt <i>Escherichia coli</i> Cell Division
Published 2025-01-01“…Deleting either the C-terminal 11 residues or the N-terminal 5 residues of Kil still allowed the inhibition of <i>E. coli</i> cell division, but removing both termini nearly abolished this activity, indicating that a minimal region within the Kil HTH core is essential for its structure and function. …”
Get full text
Article -
855
The Challenges of Distinguishing Different Causes of TMA in a Pregnant Kidney Transplant Recipient
Published 2024-01-01“…The first pregnancy was terminated at 22 weeks gestation due to presumed severe preeclampsia and fetal growth restriction in the context of known chronic kidney failure due to reflux nephropathy. …”
Get full text
Article -
856
Incidence and Control of Symptoms at the End of Life in Cancer Patients
Published 2021-12-01“…<br /><strong>Conclusion:</strong> the symptoms in terminal patients with cancer diseases are multiple and variable, sometimes closely related to the natural history of their disease. …”
Get full text
Article -
857
Expanded non-invasive prenatal testing offers better detection of fetal copy number variations but not chromosomal aneuploidies.
Published 2025-01-01“…However, the rate of pregnancy termination for common trisomies, RAAs, and CNVs was higher than that for SCAs.…”
Get full text
Article -
858
Chronic Benign Tubular Albuminuria From Compound Heterozygous Variants in : A Case Report
Published 2025-02-01“…Recent evidence suggests that C-terminal variants in CUBN may lead to albuminuria without other features of IGS. …”
Get full text
Article -
859
Tissue-specific resistance and susceptibility to the tomato brown rugose fruit virus (ToBRFV) conferred by Solanum pennellii loci
Published 2025-01-01“…Another locus for resistance was mapped to chromosome 3, which protected the terminal and axillary shoots of the TOP BILs only. …”
Get full text
Article -
860
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article