Results 81 to 90 of about 11,841,471 (334)
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Computer Communication Network Fault Detection Based on Improved Neural Network Algorithm
Dong Sun +3 more
doaj +1 more source
A Metadata Registry for Metadata Interoperability
In order to use distributed and heterogeneous scientific databases effectively, semantic heterogeneities have to be detected and resolved. To solve this problem, we propose architecture for managing metadata and metadata schema using a metadata registry.
Jian-hui Li +4 more
doaj +1 more source
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Network optimization by regional computing for UAVs' big data
Unmanned Aerial Vehicles (UAVs) are increasingly used in sectors such as surveillance, agriculture, and disaster response, generating massive volumes of real-time big data. Traditional cloud computing introduces high latency, while edge computing suffers
Afzal Badshah +5 more
doaj +1 more source
Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis [PDF]
This paper reports on generic issues discovered as a result of conducting computer and network vulnerability assessments (CNVA) on Australian critical infrastructure providers.
Valli, Craig, Woodward, Andrew
core +1 more source
Structural insights into an engineered feruloyl esterase with improved MHET degrading properties
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa +5 more
wiley +1 more source
Dynamic ID-based remote user authentication scheme using ElGamal encryption system
We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce.
Rafael Martínez Peláez +3 more
doaj +1 more source

