Results 81 to 90 of about 89,051 (286)

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

open access: yesCybernetics and Information Technologies, 2020
This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT ...
Alhumyani Hesham
doaj   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

ANOTHER BACONIAN CIPHER [PDF]

open access: green, 1909
WALTER W. GREG
openalex   +1 more source

Modern Crypto-Analysis of Polyalphabetic Ciphers Using a Genetic Algorithm

open access: yes, 2015
This project involved implementing a genetic algorithm to help automate the crypto-analysis of the Vigenere ...
Heald, Benjamin E.
core  

RAD50 missense variants differentially affect the DNA damage response and mitotic progression

open access: yesFEBS Letters, EarlyView.
RAD50 incorporates into the MRN complex and initiates the DNA damage response. Furthermore, RAD50 promotes mitotic progression. RAD50 missense variants capable of forming an MRN complex supported the DNA damage response and mitotic features to different extents in complementation experiments, indicating these functions are separable and might impact ...
Hanna Redeker   +9 more
wiley   +1 more source

Security amplification by composition: The case of doubly-iterated, ideal ciphers [PDF]

open access: bronze, 1998
William Aiello   +3 more
openalex   +3 more sources

Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm

open access: yesМоделирование и анализ информационных систем, 2011
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj  

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Plasmodium falciparum gametogenesis essential protein 1 (GEP1) is a transmission‐blocking target

open access: yesFEBS Letters, EarlyView.
This study shows Plasmodium falciparum GEP1 is vital for activating sexual stages of malarial parasites even independently of a mosquito factor. Knockout parasites completely fail gamete formation even when a phosphodiesterase inhibitor is added. Two single‐nucleotide polymorphisms (V241L and S263P) are found in 12%–20% of field samples.
Frederik Huppertz   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy