Results 91 to 100 of about 299,742 (318)
In this work, we reveal how different enzyme binding configurations influence the fluorescence decay of NAD(P)H in live cells using time‐resolved anisotropy imaging and fluorescence lifetime imaging microscopy (FLIM). Mathematical modelling shows that the redox states of the NAD and NADP pools govern these configurations, shaping their fluorescence ...
Thomas S. Blacker+8 more
wiley +1 more source
U.S. Export Controls on Technology Transfers [PDF]
Companies selling technology products abroad must be careful that they have complied with regulations imposed on the exportation of technology products. This is especially true for companies seeking to export encryption technology.
Crane, Matthew
core +1 more source
Development of visible light‐sensitive human neuropsin (OPN5) via single amino acid substitution
The present study determines a key amino acid residue, Lys91, for defining UV sensitivity of human OPN5. Heterologous action spectroscopy of the wild type and K91 mutants of OPN5 in HEK293T cells reveals that substitution of Lys91 with neutral (alanine) or acidic amino acids (glutamic or aspartic acids) causes substantial shifts in spectral sensitivity
Yusuke Sakai+2 more
wiley +1 more source
CREATING AND ENCRYPTING E-COMMERCE DATABASE FOR SELLING MECHANICAL ELEMENTS
In this paper it is presented creation and encryption of e-commerce database for selling mechanical elements. It is shown a procedure of creation a database and tables with appropriate data, which is the first step in developing stable e-commerce ...
Djordje Dihovični, Vlado Krunić
doaj +1 more source
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattices, two improvements are available in the new scheme.
Yaling Zhang, Shangping Wang, Qing Du
doaj +1 more source
Exploring lipid diversity and minimalism to define membrane requirements for synthetic cells
Designing the lipid membrane of synthetic cells is a complex task, in which its various roles (among them solute transport, membrane protein support, and self‐replication) should all be integrated. In this review, we report the latest top‐down and bottom‐up advances and discuss compatibility and complexity issues of current engineering approaches ...
Sergiy Gan+2 more
wiley +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
C‐mannosylation is a unique form of protein glycosylation. In this study, we demonstrated that ADAMTS1 is C‐mannosylated at Trp562 and Trp565 in human testicular germ cell tumor NEC8 cells. We found that C‐mannosylation of ADAMTS1 is essential for its secretion, processing, enzymatic activity, and ability to promote vasculogenic mimicry. These findings
Takato Kobayashi+5 more
wiley +1 more source
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley +1 more source