Results 71 to 80 of about 212,764 (321)
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley +1 more source
A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang +4 more
doaj +1 more source
Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani +4 more
wiley +1 more source
Message passing variational autoregressive network for solving intractable Ising models
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma +4 more
doaj +1 more source
On the Frobenius’ Problem of three numbers [PDF]
Given $k$ natural numbers $\{a_1, \ldots ,a_k\} \subset \mathbb{N}$ with $1 \leq a_1 < a_2 < \ldots < a_k$ and $\mathrm{gcd} (a_1, \ldots ,a_k)=1$, let be $R(a_1, \ldots ,a_k) = \{ \lambda_1 a_1+ \cdots + \lambda_k a_k | \space \lambda_i \in \mathbb{N ...
Francesc Aguiló, Alícia Miralles
doaj +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
A novel multi-carrier visual cryptography scheme based on XOR and OR operations
The conventional Visual Cryptography Scheme (VCS) relying solely on OR operations suffers from poor recovery quality and severe pixel expansion when implemented on physical transparencies.
Yuan Gao +4 more
doaj +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source
A bimodal lattice-based linearly homomorphic signature for chain-based implicit data storage scheme
As the demand for cross-domain collaborative verification grows in fields such as healthcare and industrial Internet of Things, achieving secure and efficient verification of heterogeneous data has become a critical challenge.
Ruifeng Li +4 more
doaj +1 more source

