Results 91 to 100 of about 2,138,949 (260)
Aplikasi Keamanan File Algoritma Blowfish pada Universitas Lancang Kuning
Abstrak- Salah satu algoritma kriptografi adalah algoritma Blowfish yang merupakan algoritma kriptografi modern kunci simetris berbentuk cipher block. Aplikasi yang dibangun ini dapat mengenkripsi file (plaintext) dalam bentuk teks, gambar, suara, video,
Nurliana Nasution +2 more
doaj
Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj +3 more
wiley +1 more source
Realization of the File Format Processing System for LKJ Running Record Data
This paper introduces the realization of file format processing system for LKJ running record data, mainly focused on system composition, system function, system realization and system running condition.
杨献, 言圣
doaj
Tandem VHH targeting distinct EGFR epitopes were engineered into a monovalent bispecific antibody (7D12‐EGA1‐Fc) with more potent ADCC without increasing affinity to EGFR. Structural modeling of 7D12‐EGA1‐Fc showed cross‐linking of separate EGFR domains to enhance CD16a engagement on NK cells.
Yuqiang Xu +5 more
wiley +1 more source
Data file; Total sample population Facebook/Social connection group Amazon Mechanical Turk group Qualtrics group
openaire +1 more source
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies +3 more
wiley +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
KEAMANAN FILE MENGGUNAKAN TEKNIK KRIPTOGRAFI SHIFT CIPHER
Dampak dari kemudahan pengaksesan informasi telah dirasakan oleh banyak pihak sebagai salah satu isu dalam keamanan data, khususnya file. Informasi sangat rentan untuk dimanipulasi oleh pihak yang tidak berkepentingan.
Eko Hari Rachmawanto, Christy Atika Sari
doaj
NF90–NF45 functions as a negative regulator of methyltransferase‐like 3/14 (METTL3/14)‐mediated N6‐methyladenosine (m6A) modification on primary microRNAs (pri‐miRNAs). NF90–NF45 binds to anti‐oncogenic pri‐miRNAs and inhibits their m6A modification, thereby suppressing the biogenesis of anti‐oncogenic miRNAs.
Takuma Higuchi +6 more
wiley +1 more source

