Results 71 to 80 of about 233,785 (333)
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.+2 more
core +2 more sources
miRNA‐29 regulates epidermal and mesenchymal functions in skin repair
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan+10 more
wiley +1 more source
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring+6 more
wiley +1 more source
Message passing variational autoregressive network for solving intractable Ising models
Deep neural networks have been used to solve Ising models, including autoregressive neural networks, convolutional neural networks, recurrent neural networks, and graph neural networks.
Qunlong Ma+4 more
doaj +1 more source
On the Frobenius’ Problem of three numbers [PDF]
Given $k$ natural numbers $\{a_1, \ldots ,a_k\} \subset \mathbb{N}$ with $1 \leq a_1 < a_2 < \ldots < a_k$ and $\mathrm{gcd} (a_1, \ldots ,a_k)=1$, let be $R(a_1, \ldots ,a_k) = \{ \lambda_1 a_1+ \cdots + \lambda_k a_k | \space \lambda_i \in \mathbb{N ...
Francesc Aguiló, Alícia Miralles
doaj +1 more source
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang+2 more
wiley +1 more source
Cryptography - Lecture 3: Modern cryptography
Cryptography - Lecture 3: Modern cryptography This lecture is devoted to general description of basic ideas of the modern cryptography - block ciphers (DES, AES) and public key cryptography (secret transmission, electronic signature, key exchange and secret sharing schemes)
openaire +2 more sources
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever+1 more
wiley +1 more source
Tomographic Quantum Cryptography
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige+28 more
core +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source