Results 111 to 120 of about 1,726,359 (308)
Room temperature single-photon detectors for high bit rate quantum key distribution [PDF]
L. C. Comandar +8 more
openalex +1 more source
Autophagosome marker, LC3, is released extracellularly via several distinct pathways
This study establishes a novel HiBiT‐tagging system for ultrasensitive detection of LC3, revealing multiple pathways for its extracellular secretion. It demonstrates that LC3 is released via both autophagy‐dependent and ‐independent mechanisms, including a novel route for nonlipidated LC3‐I.
Koki Saito +3 more
wiley +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
Analysis of Treacher Collins syndrome 4‐associated mutations in Schizosaccharomyces pombe
Fission yeast models carrying Treacher Collins syndrome type 4‐associated mutations reveal that impaired processivity of RNA polymerase I leads to defective rRNA transcription. This study highlights the essential role of a conserved arginine residue in Pol I elongation and provides mechanistic insight into the pathogenesis of ribosomopathies.
Kei Kawakami, Hiroaki Kato
wiley +1 more source
A Self-adaptive Bit-level Color Image Encryption Algorithm Based on Generalized Arnold Map
A self-adaptive bit-level color image encryption algorithm based on generalized Arnold map is proposed. The red, green, blue components of the plain-image with height H and width W are decomposed into 8-bit planes and one three-dimensional bit matrix ...
Ye Rui-Song +4 more
doaj +1 more source
128-Bit Secured Hybrid Key for Cryptographic Algorithms
In this paper a high degree of accuracy coupled with enhanced security 128 bit hybrid cryptographic key is generated. This key is generated by considering more than one biometric template. Then to increase the security further, it is fused with an binding key, using the fuzzy commitment scheme.
openaire +1 more source
Distribution Key in Eight Bit's Color Image Algorithm [PDF]
Planteamiento del problema: Los sistemas multimedia en red han glorificado la necesidad de protección de los derechos de autor de la imagen. Para resolver este problema, se agrega una estructura invisible llamada marca de agua a una imagen en color de 8 bits con el objetivo de marcarla.
openaire +1 more source
Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig +7 more
wiley +1 more source
Using Panax japonicus as research material, callus induction and culture were carried out, and high-yielding cell lines were screened to establish a suspension culture system that promotes callus growth and the accumulation of the “total saponins” (total
Siqin Lv +5 more
doaj +1 more source
VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM [PDF]
A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys.
B. SENTHILKUMAR, V. RAJAMANI
doaj

