Results 231 to 240 of about 84,080 (308)
Image encryption scheme based on thorp shuffle and pseudo dequeue. [PDF]
Geng S, Guo D, Zhang X, Wang Y, Niu Y.
europepmc +1 more source
A potential tumor suppressor role of PLK2 in glioblastoma
PLK2 was consistently downregulated in GBM tissues. Overexpression of PLK2 in GBM cell lines U87MG and U251 reduced their tumorigenic potential and enhanced cell cycle arrest and apoptosis. Suggesting that PLK2 overexpression could potentially be leveraged as a therapeutic strategy to inhibit tumor progression and enhance apoptosis, providing new ...
Xiangping Xia+5 more
wiley +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]
Chuah CW, Harun NZ, Hamid IRA.
europepmc +1 more source
A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead
V. S. Shankar Sriram+2 more
openalex +1 more source
Identification of inhibitors of the Salmonella FraB deglycase, a drug target
A high‐throughput screen was used to identify inhibitors of Salmonella FraB, a drug target. Characterization of top hits (identified after an additional counter screen) revealed that some triazolidines, thiadiazolidines, and triazolothiadiazoles are mixed‐type inhibitors of FraB.
Jamison D. Law+6 more
wiley +1 more source
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos. [PDF]
Zhao Y, Shi Q, Ding Q.
europepmc +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source
Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission. [PDF]
Shafiq S+7 more
europepmc +1 more source
Red blood cells could protect miRNAs from degradation or loss thanks to Argonaute 2 binding
The present work investigates the presence and the stability of miRNAs into RBCs, both native and engineered. The observed stability is due to the Ago2 bound resulting in minimal RISC. Indeed, if the miRNA‐Ago2 complex is present, miRNAs are protected from release or degradation and they are biologically active. Thus, RBCs can act as miRNA carriers for
Elena Perla+4 more
wiley +1 more source
Implementing Grover's on AES-based AEAD schemes. [PDF]
Mandal S+4 more
europepmc +1 more source