Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
challenges in peptide therapeutics discovery for intracellular targets lies in achieving reliable cell penetration. Unlike Lipinski’s 'rule of five' which can guide small molecule drug design, there is
-
of £18,622 Overview The cellular response to low oxygen levels (hypoxia), is crucial for cell survival and identity. At the cellular level, the transcriptional response is primarily orchestrated by
-
at Newcastle University. Microalgae are playing increasingly prominent roles in wastewater bioremediation, where their well-known ability to absorb metals, nitrogen and phosphorous is used in solar driven
-
5 Mar 2024 Job Information Organisation/Company Newcastle University Research Field Biological sciences » Biology Researcher Profile First Stage Researcher (R1) Country United Kingdom Application
-
Cultural Communication About the British Council The British Council is the UK’s international organisation for cultural relations and educational opportunities. We build connections, understanding and trust
-
200-fold reduction in reactor size while removing an organic solvent altogether, whilst maintaining productivity and improving yield/selectivity etc. We expect to achieve similar results with our
-
Intensification Group at Newcastle University. Nestling has designed a containerised cultivation and processing plant for a broad range of microorganisms with a focus on mycelium. The system is fully automated
-
; electro-magnetic flow meter in the main delivery pipe; accurate depth and velocity measurement; and a flood dam release system generates a flood wave. Numerical models have been developed to represent
-
of the local cyberphysical system in order to attribute attacks or detect stepping stones. This prompts several big research challenges. First, invisibility -- attackers avoid detection borrowing techniques from
-
of the local cyberphysical system in order to attribute attacks or detect stepping stones. This prompts several big research challenges. First, invisibility -- attackers avoid detection borrowing techniques from