Results 111 to 120 of about 1,726,359 (308)

Room temperature single-photon detectors for high bit rate quantum key distribution [PDF]

open access: green, 2014
L. C. Comandar   +8 more
openalex   +1 more source

Autophagosome marker, LC3, is released extracellularly via several distinct pathways

open access: yesFEBS Open Bio, EarlyView.
This study establishes a novel HiBiT‐tagging system for ultrasensitive detection of LC3, revealing multiple pathways for its extracellular secretion. It demonstrates that LC3 is released via both autophagy‐dependent and ‐independent mechanisms, including a novel route for nonlipidated LC3‐I.
Koki Saito   +3 more
wiley   +1 more source

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

Analysis of Treacher Collins syndrome 4‐associated mutations in Schizosaccharomyces pombe

open access: yesFEBS Open Bio, EarlyView.
Fission yeast models carrying Treacher Collins syndrome type 4‐associated mutations reveal that impaired processivity of RNA polymerase I leads to defective rRNA transcription. This study highlights the essential role of a conserved arginine residue in Pol I elongation and provides mechanistic insight into the pathogenesis of ribosomopathies.
Kei Kawakami, Hiroaki Kato
wiley   +1 more source

A Self-adaptive Bit-level Color Image Encryption Algorithm Based on Generalized Arnold Map

open access: yesITM Web of Conferences, 2017
A self-adaptive bit-level color image encryption algorithm based on generalized Arnold map is proposed. The red, green, blue components of the plain-image with height H and width W are decomposed into 8-bit planes and one three-dimensional bit matrix ...
Ye Rui-Song   +4 more
doaj   +1 more source

128-Bit Secured Hybrid Key for Cryptographic Algorithms

open access: yes, 2021
In this paper a high degree of accuracy coupled with enhanced security 128 bit hybrid cryptographic key is generated. This key is generated by considering more than one biometric template. Then to increase the security further, it is fused with an binding key, using the fuzzy commitment scheme.
openaire   +1 more source

Distribution Key in Eight Bit's Color Image Algorithm [PDF]

open access: yesJournal of Computer Science, 2012
Planteamiento del problema: Los sistemas multimedia en red han glorificado la necesidad de protección de los derechos de autor de la imagen. Para resolver este problema, se agrega una estructura invisible llamada marca de agua a una imagen en color de 8 bits con el objetivo de marcarla.
openaire   +1 more source

Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276

open access: yesFEBS Open Bio, EarlyView.
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig   +7 more
wiley   +1 more source

Induction and Suspension Culture of Panax japonicus Callus Tissue for the Production of Secondary Metabolic Active Substances

open access: yesPlants
Using Panax japonicus as research material, callus induction and culture were carried out, and high-yielding cell lines were screened to establish a suspension culture system that promotes callus growth and the accumulation of the “total saponins” (total
Siqin Lv   +5 more
doaj   +1 more source

VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys.
B. SENTHILKUMAR, V. RAJAMANI
doaj  

Home - About - Disclaimer - Privacy