Showing 121 - 140 results of 537 for search '"Trojan Horse"', query time: 0.21s Refine Results
  1. 121

    Burkholderia pseudomallei-loaded cells act as a Trojan horse to invade the brain during endotoxemia by Pei-Tan Hsueh, Hsi-Hsun Lin, Chiu-Lin Liu, Wei-Fen Ni, Ya-Lei Chen, Yao-Shen Chen

    Published 2018-09-01
    “…This study aims to test whether the Trojan horse-like mechanism occurs during endotoxemia. …”
    Get full text
    Article
  2. 122
  3. 123

    Immunoadjuvant Nanoparticles as Trojan Horses for Enhanced Photo-Immunotherapy in the Treatment of Triple-Negative Breast Cancer by Jinxian Wu, Jinxian Wu, Shanyong Wang, Shanyong Wang, Shanshan Liu, Shanshan Liu, Fang Liu, Fang Liu, Feifan Zhou, Feifan Zhou

    Published 2022-05-01
    “…In this strategy, the self-associated synthesis of spherical GC@ICG significantly improved the stability of ICG and endowed GC with Trojan Horses in tumor cells to enhance tumor immunogenicity. …”
    Get full text
    Article
  4. 124
  5. 125
  6. 126

    Sub-Coulomb nuclear studies using Indirect Methods: Recent results with the Trojan Horse Method by Tumino Aurora

    Published 2024-01-01
    “…One such technique, the Trojan Horse Method, makes use of transfer reactions to determine cross sections of reactions relevant in stellar burning processes. …”
    Get full text
    Article
  7. 127
  8. 128

    Recognition of endophytic Trichoderma species by leaf-cutting ants and their potential in a Trojan-horse management strategy by Silma L. Rocha, Harry C. Evans, Vanessa L. Jorge, Lucimar A. O. Cardoso, Fernanda S. T. Pereira, Fabiano B. Rocha, Robert W. Barreto, Adam G. Hart, Simon L. Elliot

    Published 2017-01-01
    “…These results indicate that endophytic fungi which pose a threat to ant fungal gardens through their antagonistic traits, such as Trichoderma, have the potential to act as bodyguards of their plant hosts and thus might be employed in a Trojan-horse strategy to mitigate the negative impact of leaf-cutting ants in both agriculture and silviculture in the Neotropics. …”
    Get full text
    Article
  9. 129
  10. 130

    Study of 3He(n,p)3H reaction at cosmological energies with trojan horse method by Spampinato C., Pizzone R.G., Spartà R., Couder M., Tan W., Burian V., Chae K.Y., D’Agata G., Guardo G.L., Indelicato I., Cognata M. La, Lamia L., Lattuada D., Mrazek J., Oliva A., Palmerini S., Prajapati P.M., Rapisarda G.G., Romano S., Sergi M.L., Spitaleri C., Tumino A., Wiescher M., Anguilar S., Bardyan D., Blankstein D., Boccioli L., Callahan L., Clark A., Frentz B., Hall M., Gula A., Henderson S., Kelmar R., Liu Q., Long J., Majumdar A., McGuinness S., Nelson A., O’Malley P., Seyymour C., Skulski M., Wilkinson J.

    Published 2020-01-01
    “…In the network of reactions present in the Big Bang nucleosynthesis, the 3He(n, p)3H has an important role which impacts the final 7Li abundance. The Trojan Horse Method (THM) has been applied to the 3He(d, pt)H reaction in order to extract the astrophysical S(E)-factor of the 3He(n, p)3H in the Gamow energy range. …”
    Get full text
    Article
  11. 131
  12. 132

    The ComP-ComA quorum system is essential for "Trojan horse" like pathogenesis in Bacillus nematocida. by Xidan Deng, Yunxia Tian, Qiuhong Niu, Xiao'e Xu, Hui Shi, Hanbo Zhang, Lianming Liang, Keqin Zhang, Xiaowei Huang

    Published 2013-01-01
    “…Bacillus nematocida B16 has been shown to use "Trojan horse" mechanism in pathogenesis that has characteristics of "social" behavior. …”
    Get full text
    Article
  13. 133
  14. 134
  15. 135
  16. 136
  17. 137
  18. 138
  19. 139

    Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security by Li Gang, Yong Wen

    Published 2022-01-01
    “…At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. …”
    Get full text
    Article
  20. 140