نتایج جستجو برای: stealth liposome

تعداد نتایج: 8672  

Journal: :Colloids and surfaces. B, Biointerfaces 2014
Kovashnee Naicker Mario Ariatti Moganavelli Singh

The efficiency of liposome-mediated gene delivery is greatly enhanced by appropriate decoration of vehicles with cell-specific targeting ligands. However, liposome-DNA complexes may still be opsonized in serum thus ablating any advantage gained. A stealth aspect may therefore be conferred on complexes by poly(ethylene glycol) (PEG) grafting. Here, we examined the effect that degree of PEGylatio...

2001
Sugato Chakravarty

Using audit trail data for a sample of NYSE firms we show that medium-size trades are associated with a disproportionately large cumulative stock price change relative to their proportion of all trades and volume. This result is consistent with the predictions of Barclay and Warner’s (1993) stealth-trading hypothesis. We find that the source of this disproportionately large cumulative price imp...

2014
John Martin

The available DNA sequence data on an African green monkey simian cytomegalovirus virus (SCMV)-derived stealth adapted virus are summarized. The data provide important insight into a generic mechanism by which viruses avoid effective immunological recognition by the cellular immune system. This process is termed stealth adaptation and comprises the deletion or mutation of the relatively few vir...

Journal: :iranian journal of veterinary research 2016
f. mukherjee a. prasad v. s. bahekar s. k. rana l. rajendra

the use of liposome as an adjuvant and a vaccine carrier has been cited previously in the literature. it has also been shown to be effective in enhancing the immunogenicity of vaccine candidates. balb/c mice immunized subcutaneously with outer membrane protein (omp) of brucella abortus s19 vaccine strain entrapped in a commercial cationic liposome (s19-omp-liposome) for vaccine delivery, showed...

Journal: :Future Journal of Pharmaceutical Sciences 2022

Abstract Background Cosmeceuticals are cosmetic products with biologically active components that have drug-like benefits. currently rapidly growing segments encompassing the personal care industry and numerous topical cosmetics-based therapies for treating different skin conditions. The barrier nature of causes limitations to treatment. effectiveness this cosmeceutical product has been enhance...

Journal: :Optics express 2014
Ben Wu Zhenxing Wang Bhavin J Shastri Matthew P Chang Nicholas A Frost Paul R Prucnal

A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the security of the stealth channel in an optical steganography system. The stealth channel is protected in two levels. In the first level, the data is carried by amplified spontaneous emission (ASE) noise, which cannot be detected in either the time domain or spectral domain. In the second level, eve...

2016
Alexander Borodovski Clark Verbrugge

The ability to distract opponents is a key mechanic in many stealth games. Existing search-based approaches to stealth analysis, however, focus entirely on solving the non-detection problem, for which they rely on static, ahead-of-time models of guard movements that do not depend on player interaction. In this work we extend and optimize an approach based on heuristic search of stealth games to...

2015
Wookhee Min Megan Hardy Frankosky Bradford W. Mott Jonathan P. Rowe Eric N. Wiebe Kristy Elizabeth Boyer James C. Lester

A distinctive feature of intelligent game-based learning environments is their capacity for enabling stealth assessment. Stealth assessments gather information about student competencies in a manner that is invisible, and enable drawing valid inferences about student knowledge. We present a framework for stealth assessment that leverages deep learning, a family of machine learning methods that ...

2015
Woei-Jiunn Tsaur Lo-Yao Yeh

Controlling and managing rights of digital contents has been becoming very critical in cloud-based consumer entertainment devices. The kernel-level digital rights management (DRM) software can offer stronger protection of digital contents. For effectively preventing unauthorized copying, the rootkit stealth technologies may be employed in consumer electronics (CE) environments to conceal kernel...

Journal: :Journal of High Energy Physics 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید