Results 51 to 60 of about 212,764 (321)
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer +7 more
wiley +1 more source
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo +5 more
doaj +1 more source
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini +4 more
doaj +1 more source
A Pseudo DNA Cryptography Method
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland +20 more
core +1 more source
An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino +7 more
wiley +1 more source
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security.
Zhanhui Yuan +4 more
doaj +1 more source
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan +3 more
doaj +1 more source
Signal fingerprint feature extraction and recognition method for communication satellite
Due to the complex maritime environment, communication satellite signals are inevitably subjected to various unpredictable situations which results in the noisy signal.
Zhen Guo, Kai Huang, Jun Ye
doaj +1 more source
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos +2 more
core +1 more source

