Results 91 to 100 of about 264,588 (256)

Using of tiny encryption algorithm in CAN-Bus communication

open access: yesResearch in Agricultural Engineering, 2016
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj   +1 more source

Valosin‐containing protein counteracts ATP‐driven dissolution of FUS condensates through its ATPase activity in vitro

open access: yesFEBS Letters, EarlyView.
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura   +2 more
wiley   +1 more source

Time based incremental backup scheme for mobile cloud computing

open access: yes网络与信息安全学报, 2016
A time-based data secure backup mechanism for moving the cloud was presented.Time was considered as a parameter into the data encryption for the important information in mobile device and backups the users' data ac-cording to the time period.It had not ...
Yun-fei CI   +5 more
doaj  

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption

open access: yesEntropy
The diffusion phenomenon that exhibits intrinsic similarities is pervasive in cryptography and natural systems, evident in liquid diffusion, epidemic spread, animal migration, and encryption techniques.
Wei Zhang   +5 more
doaj   +1 more source

LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY [PDF]

open access: yesChallenges of the Knowledge Society, 2017
Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC), it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide
Ramona DUMITRAȘCU
doaj  

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

BACP-LRS: Blockchain and IPFS-based Land Record System

open access: yesActa Informatica Pragensia
Background: Land records have traditionally derived their credibility from a central database of local government records, with copies issued to land owners.
Insaf Boumezbeur   +5 more
doaj   +1 more source

Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption

open access: yesIEEE Access, 2019
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become
Hsiang-Ying Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy