Results 91 to 100 of about 130,132 (369)

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: yesPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj   +1 more source

Structural insights into lacto‐N‐biose I recognition by a family 32 carbohydrate‐binding module from Bifidobacterium bifidum

open access: yesFEBS Letters, EarlyView.
Bifidobacterium bifidum establishes symbiosis with infants by metabolizing lacto‐N‐biose I (LNB) from human milk oligosaccharides (HMOs). The extracellular multidomain enzyme LnbB drives this process, releasing LNB via its catalytic glycoside hydrolase family 20 (GH20) lacto‐N‐biosidase domain.
Xinzhe Zhang   +5 more
wiley   +1 more source

Kriptografi Polyalphabetic

open access: yesMatematika, 2018
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan.
Yurika Permanasari, Erwin Harahap
doaj   +1 more source

The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity

open access: yesFEBS Letters, EarlyView.
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley   +1 more source

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

The Methods of Information Security Based on Blurring of System

open access: yesБезопасность информационных технологий, 2016
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj  

Child Health Clinical Outcome Review Programme: Health Care Utilisation, Care Pathways and Educational Status in Children and Young People with Adolescent Mental Health problems with a focus on Self harm, Eating Disorders and Anxiety and Depression

open access: yesInternational Journal of Population Data Science, 2017
Objectives To use routinely collected datasets and data linkage to identify patterns of healthcare utilisation by children and young people (CYP) with adolescent mental health (AMH) disorders across the four UK Nations, with a particular focus on self ...
Sophie Wood   +4 more
doaj   +1 more source

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

Home - About - Disclaimer - Privacy