Results 91 to 100 of about 152,070 (321)
Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3
Information security relies mainly upon encryption, and in some cases, steganography for an extra layer of security. Steganography is the science and art of secret communication between two sides that attempts to conceal the existence of the message ...
Abdelhamid Attaby +2 more
semanticscholar +1 more source
Lung cancer remains the leading cause of cancer‐related death. We investigated the role of the epigenetic regulator DMAP1 in NSCLC and found that its loss induces replication stress and DNA damage. This in turn activates type I IFN signaling via the cGAS–STING pathway and transcriptional ISG de‐repression, enhancing anti‐tumor immune responses ...
Kan Huang +10 more
wiley +1 more source
Innovative Minds Shine Bright at the 2023 ConV2X Pitch Competition
On Sept 1, 2023, Partners in Digital Health, publisher of Blockchain in Healthcare Today (BHTY,) conducted the 4th Annual ConVerge2Xcelerate (ConV2X) Ignition Pitch Competition.
Tory Cenaj
doaj
DCTNet : A Simple Learning-free Approach for Face Recognition
PCANet was proposed as a lightweight deep learning network that mainly leverages Principal Component Analysis (PCA) to learn multistage filter banks followed by binarization and block-wise histograming.
Ng, Cong Jie, Teoh, Andrew Beng Jin
core +1 more source
We generated multi‐tissue single‐cell transcriptomic atlases of camels and cattle, uncovering conserved and lineage‐specific cellular features across digestive and metabolic systems. Cross‐species comparisons revealed the evolutionary origin of the camel glandular sac and identified novel cell populations linked to physiological specialization ...
Tao Shi +22 more
wiley +1 more source
Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform
This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT ...
Alhumyani Hesham
doaj +1 more source
Cellular Identity Crisis: RD3 Loss Fuels Plasticity and Immune Silence in Progressive Neuroblastoma
Researchers discovered that therapy‐induced loss of RD3 protein in neuroblastoma triggers a dangerous shift: cancer cells become more stem‐like, invasive, and resistant to treatment while evading immune detection. RD3 loss suppresses antigen presentation and boosts immune checkpoints, creating an immune‐silent environment.
Poorvi Subramanian +7 more
wiley +1 more source
This study delineates macrophage heterogeneity along the acute kidney injury to chronic kidney disease transition. Single‐cell RNA sequencing reveals a TRAP5+ scar‐associated macrophage subset driven by Spp1–Cd44 signaling and mitochondrial metabolic reprogramming.
Chenxi Wang +13 more
wiley +1 more source
In Defence of the Epistemological Objection to Divine Command Theory [PDF]
Divine command theories come in several different forms but at their core all of these theories claim that certain moral statuses exist in virtue of the fact that God has commanded them to exist. Several authors argue that this core version of the DCT is
Danaher, John
core
In this study, the orange‐muscle giant abalone (Haliotis gigantea) is used as a model to identify a non‐coding SNP that disrupts the interaction between ITGA8 pre‐mRNA and the splicing factor ILF2, leading to altered ITGA8 splicing. These splicing changes promote carotenoid accumulation in abalone muscle through the regulation of tissue remodeling ...
Xiaohui Wei +17 more
wiley +1 more source

