Results 81 to 90 of about 24,642,685 (320)

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Impostor leader and knowledge hiding: Attachment avoidance as underlying mechanism

open access: yesActa Psychologica
Impostorism and knowledge-hiding behaviors negatively impact employees and organizational performance. This study examines the association between impostor leaders and knowledge hiding (evasive hiding, playing dumb, and rationalized hiding).
Laibin Wang   +3 more
doaj   +1 more source

BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma

open access: yesFEBS Open Bio, EarlyView.
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru   +6 more
wiley   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

PROPYLA: Privacy Preserving Long-Term Secure Storage

open access: yes, 2018
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave   +9 more
core   +1 more source

A High-Capacity Reversible Data Hiding in Encrypted Images Employing Local Difference Predictor

open access: yesIEEE transactions on circuits and systems for video technology (Print), 2020
Some methods developed in reversible data hiding (RDH) make use of prediction for data embedding for original pixel estimation. Predicators may also be exploited in RDH in encrypted image (RDHEI); this has become a research interest in recent years ...
A. Mohammadi, M. Nakhkash, M. Akhaee
semanticscholar   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors

open access: yesIEEE Access, 2018
Reversible data hiding is an important topic of data hiding. This paper proposes a novel separable and error-free reversible data hiding in an encrypted image based on two-layer pixel errors.
Chunqiang Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy