Results 81 to 90 of about 87,772 (336)

Neutrophil deficiency increases T cell numbers at the site of tissue injury in mice

open access: yesFEBS Letters, EarlyView.
In wild‐type mice, injury or acute inflammation induces neutrophil influx followed by macrophage accumulation. Mcl1ΔMyelo (neutrophil‐deficient) mice lack neutrophils, and in response to muscle injury show fewer macrophages and exhibit strikingly elevated T‐cell numbers, primarily non‐conventional “double‐negative” (DN) αβ and γδ T cells.
Hajnalka Halász   +6 more
wiley   +1 more source

Child Health Clinical Outcome Review Programme: Health Care Utilisation, Care Pathways and Educational Status in Children and Young People with Adolescent Mental Health problems with a focus on Self harm, Eating Disorders and Anxiety and Depression

open access: yesInternational Journal of Population Data Science, 2017
Objectives To use routinely collected datasets and data linkage to identify patterns of healthcare utilisation by children and young people (CYP) with adolescent mental health (AMH) disorders across the four UK Nations, with a particular focus on self ...
Sophie Wood   +4 more
doaj   +1 more source

12 Ciphers

open access: yes, 2020
Another prime mover in the development of computers was cryptography – and in particular the breaking of German military codes during the second world war. It was this activity which really led to the modern computer era.
openaire   +2 more sources

Mechanisms and kinetic assays of aminoacyl‐tRNA synthetases

open access: yes
FEBS Letters, EarlyView.
Igor Zivkovic   +2 more
wiley   +1 more source

Development of visible light‐sensitive human neuropsin (OPN5) via single amino acid substitution

open access: yesFEBS Letters, EarlyView.
The present study determines a key amino acid residue, Lys91, for defining UV sensitivity of human OPN5. Heterologous action spectroscopy of the wild type and K91 mutants of OPN5 in HEK293T cells reveals that substitution of Lys91 with neutral (alanine) or acidic amino acids (glutamic or aspartic acids) causes substantial shifts in spectral sensitivity
Yusuke Sakai   +2 more
wiley   +1 more source

Kriptografi Polyalphabetic

open access: yesMatematika, 2018
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan.
Yurika Permanasari, Erwin Harahap
doaj   +1 more source

Exploring lipid diversity and minimalism to define membrane requirements for synthetic cells

open access: yesFEBS Letters, EarlyView.
Designing the lipid membrane of synthetic cells is a complex task, in which its various roles (among them solute transport, membrane protein support, and self‐replication) should all be integrated. In this review, we report the latest top‐down and bottom‐up advances and discuss compatibility and complexity issues of current engineering approaches ...
Sergiy Gan   +2 more
wiley   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

The multidrug and toxin extrusion (MATE) transporter DTX51 antagonizes non‐cell‐autonomous HLS1–AMP1 signaling in a region‐specific manner

open access: yesFEBS Letters, EarlyView.
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley   +1 more source

The Methods of Information Security Based on Blurring of System

open access: yesБезопасность информационных технологий, 2016
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj  

Home - About - Disclaimer - Privacy