-
121
Gag-Pol processing during HIV-1 virion maturation: a systems biology approach.
Published 2013-01-01“…The process has several layers of complexity (multiple cleavage sites and substrates; multiple enzyme forms; PR auto-processing), which calls for a systems level approach to identify key vulnerabilities and optimal treatment strategies. …”
Get full text
Article -
122
Ris-assisted integrated sensing and communication: applications, challenges and usecase scenario
Published 2025-06-01“…This study also integrates mathematical models to optimize path loss, enhance signal quality, and improve resource allocation. …”
Get full text
Article -
123
Assessing CO2 Fluxes for European Peatlands in ORCHIDEE‐PEAT With Multiple Plant Functional Types
Published 2025-06-01Get full text
Article -
124
The robust-fragile duality of the ATLAS collaboration network
Published 2025-07-01“…Abstract Big Science initiatives like the ATLAS experiment at CERN exemplify the scale and complexity of modern collaborative research. With thousands of scientists and institutions from over 40 countries, ATLAS represents a global effort to uncover fundamental aspects of particle physics. …”
Get full text
Article -
125
Multi-Party Controlled Semi-Quantum Dialogue Protocol Based on Hyperentangled Bell States
Published 2025-06-01“…This encoding mechanism assigns values to each character by constructing a Huffman tree, generating optimal prefix codes that significantly optimize the storage space complexity for the classical participant. …”
Get full text
Article -
126
Novel treatment approaches utilizing antibody-drug conjugates in breast cancer
Published 2025-05-01“…We further demonstrate the complexity and challenges of improving ADCs to enhance targeting of tumor vulnerabilities while limiting toxicity through rationale drug development strategies to enhance the therapeutic window, linker technology, and payload variability to continue to improve outcomes for patients with breast cancer.…”
Get full text
Article -
127
Effects of simplicial centrality on robustness of higher-order multiplex world trade networks
Published 2024-01-01“…Simplicial centrality on robustness of multiplex world trade networks under random and targeted attacks reveals that the complex connectivity of higher-order levels renders them more vulnerable post-attack. …”
Get full text
Article -
128
Risk Transmission and Resilience of China’s Corn Import Trade Network
Published 2025-04-01“…The global corn trade is an important pillar of the agricultural economy, but its supply chain is vulnerable to geopolitical conflicts, climate change, and market volatility. …”
Get full text
Article -
129
Energy poverty from a life cycle sustainability assessment perspective
Published 2025-09-01“…Energy poverty (EP) and energy security (ES) are complex, multi-dimensional challenges with profound environmental, economic, and social implications that persist in both developed and developing nations. …”
Get full text
Article -
130
An Assessment of University Campus Morphological Resilience Under Typical Disaster Scenarios: A Case Study of the Two Campuses of Tianjin University
Published 2025-06-01“…Amid intensifying climatic threats, university campuses are increasingly vulnerable. Morphological resilience offers a practical pathway to strengthen disaster response in higher-education institutions. …”
Get full text
Article -
131
Assessment and Enhancement of Coastal Community Resilience Strategies: A Case Study of Wuyuan Bay in Xiamen
Published 2025-04-01“…Wetland ecosystems notably reduced drainage system loads through hydrological regulation and flood detention mechanisms. (4) Optimization strategies for coastal community resilience. …”
Get full text
Article -
132
Uncertainty-aware Fourier ptychography
Published 2025-07-01“…We introduce Uncertainty-Aware FP (UA-FP), a comprehensive framework that simultaneously addresses multiple system uncertainties without requiring complex calibration and data collection procedures. …”
Get full text
Article -
133
USING THE ANYLOGIC ENVIRONMENT FOR MODELING AND ANALYSIS OF THE INFORMATION SECURITY AUDIT PROCESS
Published 2025-05-01“…The relevance of the study is due to the increasing complexity of cyber threats and the need to optimize the resources spent on ensuring the security of information systems. …”
Get full text
Article -
134
Drug‐Related Side Effects and Contributing Risk Factors in Children With Congenital Heart Disease: A Cross‐Sectional Study
Published 2025-05-01“…Future research should prioritize longitudinal studies to establish causality relationships, optimize treatment protocols, and improve medication safety in this vulnerable population.…”
Get full text
Article -
135
Construction and Overall Protection of Ecological and Marine Cultural Composite Landscape Network in Quanzhou, Fujian
Published 2025-07-01“…Therefore, in the optimization of the complex landscape corridor, we should focus on the restoration of the ecological problems in the coastal areas and the central urban areas, and transform the cultural-oriented network into an ecological-cultural dual-function network Secondly, in the interior of the basic coordination section corridor, should focus on the ecological function and regional characteristics to enhance the cultural value. …”
Get full text
Article -
136
-
137
Amino acid derivatives of natural chlorins as a platform for the creation of targeted photosensitizers in oncology
Published 2021-01-01“…The chelating ability of DPBP conjugate with lysine was shown, and its Sn(IV) complex was obtained.Conclusions. Biological testing of DPBP with MSO and BSO showed a 5–6-fold increase in photoinduced cytotoxicity compared to the parent DPBP PS. …”
Get full text
Article -
138
ResilioMate: A Resilient Multi-Agent Task Executing Framework for Enhancing Small Language Models
Published 2025-01-01“…Recent advances in large language models (LLMs) have been limited by their processing requirements and vulnerability to adversarial assaults, whilst short language models (SLMs) struggle with performance consistency in complex tasks. …”
Get full text
Article -
139
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems
Published 2025-01-01“…Given the complexity of the tests, time constraints, and the specialized level of expertise required for pentesting, analysis and exploitation tools are commonly used. …”
Get full text
Article -
140
Secure Quantum Communication With Multi-Users in Quantum Networks
Published 2025-01-01“…Security is then further optimized with the MUQQ-ESTMP GHZ based on Multi-User Quantum Protocol, (MUQPQ), where it optimizes queries across several users. …”
Get full text
Article