Results 101 to 110 of about 478,748 (354)

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

AUTOMATING THE DATA SECURITY PROCESS [PDF]

open access: yesJournal of Defense Resources Management, 2017
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc.
Florin Ogigau-Neamtiu
doaj  

Data Security Protection in Cloud Computing by using Encryption [PDF]

open access: yesKirkuk Journal of Science, 2017
Cloud computing is a paradigm for offer information technology services on the Internet, such as hardware, software, networking and also the storage can be accessed anywhere at any time on a pay-per-use basis.
Asst. Lec. Ghassan Sabeeh Mahmood
doaj   +1 more source

Substrate specificity of Burkholderia pseudomallei multidrug transporters is influenced by the hydrophilic patch in the substrate‐binding pocket

open access: yesFEBS Letters, EarlyView.
Multidrug transporters BpeB and BpeF from the Gram‐negative pathogen Burkholderia pseudomallei have a hydrophilic patch in their substrate‐binding pocket. Drug susceptibility tests and growth curve analyses using an Escherichia coli recombinant expression system revealed that the hydrophilic patches of BpeB and BpeF are involved in the substrate ...
Ui Okada, Satoshi Murakami
wiley   +1 more source

Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube [PDF]

open access: yes, 2019
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption ...
Mushtaq, Muhammad Faheem
core  

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain
The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision‐making, innovation, and improving the efficiency of ...
Aditya Kumar Sharma   +3 more
doaj   +1 more source

Secret Channel using Video Steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence.
Lee Kar Yee, Chuah Chai Wen
doaj   +1 more source

Multipath Data Storage by Third-Order Nonlinear Optical Properties in Zinc Oxide Nanostructures

open access: yesApplied Sciences, 2020
Simultaneous activation of multiphotonic absorption and nonlinear optical refraction were employed for developing a multipath load balancing technique assisted by light and zinc oxide nanostructures.
Federico Ortíz-Trejo   +4 more
doaj   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy