Results 21 to 30 of about 52,259 (246)

A detailed workflow to develop QIIME2-formatted reference databases for taxonomic analysis of DNA metabarcoding data

open access: yesBMC Genomic Data, 2022
Background The DNA metabarcoding approach has become one of the most used techniques to study the taxa composition of various sample types. To deal with the high amount of data generated by the high-throughput sequencing process, a bioinformatics ...
Benjamin Dubois   +7 more
doaj   +1 more source

A Novel Cross-Layer Authentication Protocol for the Internet of Things

open access: yesIEEE Access, 2020
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee   +3 more
doaj   +1 more source

Offline User Authentication Ensuring Non-Repudiation and Anonymity

open access: yesSensors, 2022
User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes.
Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung
doaj   +1 more source

Glandular trichomes: the factory of artemisinin biosynthesis

open access: yesMedicinal Plant Biology
Plant glandular trichomes serve as crucial secretory organs, responsible for the production, modification, and storage of various vital secondary metabolites, including medicinal natural products, while also playing a role in plant defense mechanisms ...
Qiaojuan Zhao   +3 more
doaj   +1 more source

Authenticity as authentication

open access: yesPopular Music, 2002
This article argues for the prematurity of any dismissal of the notion of authenticity as meaningful within popular music discourse. It synthesises a range of views as to how authenticity is constructed, and offers a tri-partite typology dependent on asking who, rather than what, is being authenticated.
openaire   +3 more sources

What makes authentic questions authentic? [PDF]

open access: yesDialogic Pedagogy: An International Online Journal, 2022
In some approaches to dialogic pedagogy research, authentic questions have long attracted attention, since the prevalence of authentic questions has been used as an indicator of the dialogic quality of classroom activities. However, this article offers an analysis of the concept of authentic questions in the research literature and shows that this ...
openaire   +3 more sources

Single-nucleus transcriptomics reveal the morphogenesis and artemisinin biosynthesis in Artemisia annua glandular trichomes

open access: yesNature Communications
Artemisinin, the key antimalarial drug, is synthesized in Artemisia annua glandular secretory trichomes (GSTs), yet their development and artemisinin’s precise cellular origins are unclear.
Minghui Zhang   +7 more
doaj   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

open access: yesFuture Internet, 2023
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing.
Soumya Prakash Otta   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy