Results 61 to 70 of about 62,040 (316)
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan +5 more
doaj +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah +4 more
doaj +1 more source
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source
Encryption of Color Images utilizing cascading 3D Chaotic Maps with S-Box Algorithms
The fundamental characteristics of chaos, including sensitivity to beginning conditions and unpredictability, render it a prime candidate for cryptographic applications.
Jenan Ayad +3 more
doaj +1 more source
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core +1 more source
Interplay between RNA‐protein interactions and RNA structures in gene regulation
Methodological advances in mapping transcriptome‐wide RNA‐protein interactions and RNA structures have started to uncover the potential of RNP conformations in gene regulation. Competing RNA–RNA, RNA‐protein and protein–protein interactions shape the compaction and function of RNPs throughout their lifetime and may provide novel therapeutic targets in ...
Jenni Rapakko +2 more
wiley +1 more source
Overview of molecular signatures of senescence and associated resources: pros and cons
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas +6 more
wiley +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source

