نتایج جستجو برای: stealth liposome
تعداد نتایج: 8672 فیلتر نتایج به سال:
In order to meet requirement of indexes demonstration at fighter design’s early stage, a mission simulation-based fighter anti-ship effectiveness evaluation method on stealth capability is researched. Evaluation indexes for the mission which can be divided into parameter indexes and mission indexes are proposed. The architecture of the simulation system which includes database, computation modu...
The strain-promoted azide-alkyne cycloaddition represents an optimal metal-free method for the modular coupling of amphiphilic polymer blocks. Hydrophilic poly(oxazoline) (PMOXA) or poly(ethylene glycol) (PEG) A-blocks were coupled with a hydrophobic poly(siloxane) B-block to provide triblock copolymers capable of self-assembling into vesicular nanostructures. Stealth properties investigated vi...
Stealth games are genre of games that require the player to sneak past guards to reach a goal location. Designing a level for a stealth game is difficult, however, as the stealth paths in a level depend on a complex interplay of the physical space, the movements of enemies, and other factors. One such factor that makes the creation of good levels much more complicated, but also makes the levels...
Cytopathic “stealth-adapted” viruses bypass the cellular immune defense mechanisms because of molecular deletion or mutation of critical antigen coding genes. They, therefore, do not provoke the inflammatory reaction typical of infections with the conventional viruses from which stealth adapted viruses are derived. Stealth adapted viruses establish persistent, systemic virus infections, which c...
Hybrid liposome/metal nanoparticles are promising candidate materials for biomedical applications. However, the poor selectivity and low yield of the desired hybrid during synthesis pose a challenge. We designed a programmable liposome by selective encoding of a reducing agent, which allows self-crystallization of metal nanoparticles within the liposome to produce stable liposome/metal nanopart...
Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a targeted cyber-attack. Moreover in recent...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید