Results 71 to 80 of about 4,209 (267)

Semi-fragile Watermarking and Authentication for Law Enforcement Applications

open access: yesSecond International Conference on Innovative Computing, Informatio and Control (ICICIC 2007), 2007
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
openaire   +3 more sources

Oncolytic Probiotics with Molecular Pili for Solid Tumor Therapy

open access: yesAdvanced Science, EarlyView.
This study identifies Lactobacillus rhamnosus as an intrinsic oncolytic agent that triggers tumor metabolic collapse via calcium‐dependent ROS bursts. By chemically anchoring collagen‐targeting “molecular pili” to the bacterial surface, the engineered non‐transgenic probiotic (LR@MP) achieves targeted colonization and potent solid tumor suppression ...
Haodong Ge   +14 more
wiley   +1 more source

From cybersecurity to digital health: an AI-based eGuide framework for Oman's healthcare centers

open access: yesFrontiers in Computer Science
The AI-based eGuide platform for healthcare centers in Oman represents a cornerstone of the Sultanate's critical national health infrastructure, underpinning both patient care and national resilience. This paper develops a comprehensive cybersecurity and
Akbar Khanan   +5 more
doaj   +1 more source

Brain‐Adhesive Bioelectronics With Shape‐Morphable and Biodegradable Properties for Stable Brain Signal Monitoring

open access: yesAdvanced Science, EarlyView.
A brain‐adhesive sensor (B‐Sensor) was developed by integrating a self‐healing biodegradable elastomer, a tissue‐adhesive hydrogel, and molybdenum electrodes. The B‐Sensor adheres to brain tissue, conforms to cortical curvatures, and maintains stable electrical performance over the intended period for reliable recording of spatiotemporal brain activity
Heewon Choi   +8 more
wiley   +1 more source

Application of public key infrastructure in telecom operators

open access: yesDianxin kexue, 2020
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj   +2 more sources

Phocaeicola coprophilus‐Derived 6‐Methyluracil Attenuates Radiation‐Induced Intestinal Fibrosis by Suppressing the IDO1‐Kynurenine‐AHR Axis

open access: yesAdvanced Science, EarlyView.
IR‐induced dysbiosis depletes P. coprophilus and its metabolite 6‐methyluracil, leading to disinhibition of the IDO1‐Kyn‐AHR axis. This results in sustained fibroblast activation and collagen deposition, driving radiation induced intestinal fibrosis. ABSTRACT Therapeutic options for radiation‐induced intestinal fibrosis (RIF) remain limited. This study
Jiaxin Zhang   +11 more
wiley   +1 more source

FINGERPRINT MATCHING BASED ON PORE CENTROIDS [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2011
In recent years there has been exponential growth in the use of bio- metrics for user authentication applications. Automated Fingerprint Identification systems have become popular tool in many security and law enforcement applications.
S. Malathi, C. Meena
doaj  

Authentic bank accounting data in evidence according to Palestinian law

open access: yesAn-Najah University Journal for Research - B (Humanities), 2023
Many disputes occur between the bank and customers as a result of the implementation of the contracts that bind them. So the bank presents its accounting data as evidence to prove its right or pleaded customer’s claim of his rights. The main subject of the research e is the extent of authenticity of these data, which the bank made.
openaire   +1 more source

Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics

open access: yesAdvanced Science, EarlyView.
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma   +5 more
wiley   +1 more source

First Generation Proteolysis Targeting Chimeras (PROTACs) for the Treatment of Progeria

open access: yesAdvanced Science, EarlyView.
We report the first PROTACs designed to degrade progerin, introducing a novel therapeutic approach for progeria. The best compound, UCM‐18142, significantly reduces progerin levels and improves key disease phenotypes in patient‐derived cells and in the LmnaG609G/G609G mouse model, paving the way for new treatment strategies targeting the root cause of ...
Jon Macicior‐Michelena   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy