Results 221 to 230 of about 44,265 (336)
A DNA-based color image cryptosystem using chaotic maps, spiral mixing and non-linear binary operator. [PDF]
Bhaya C, Zain M, Singh AK.
europepmc +1 more source
As we are entering the third generation of mobile technology (3G) the number of services needing security grows larger. To assess if the security provided by 3G is sufficient, we take a closer look at the security mechanisms and their building blocks.
openaire +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Efficient Length Doubling From Tweakable Block Ciphers
Yu Long Chen +3 more
openalex +2 more sources
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini +2 more
wiley +1 more source
Digital image encryption utilizing high-dimensional cellular neural networks and lower-upper triangular decomposition of matrix. [PDF]
Tao L, Liang X, Han L, Hu B.
europepmc +1 more source
Homologous expression and purification of human HAX‐1 for structural studies
This research protocol provides detailed instructions for cloning, expressing, and purifying large quantities of the intrinsically disordered human HAX‐1 protein, N‐terminally fused to a cleavable superfolder GFP, from mammalian cells. HAX‐1 is predicted to undergo posttranslational modifications and to interact with membranes, various cellular ...
Mariana Grieben
wiley +1 more source

