Results 101 to 110 of about 230,478 (367)

miRNA‐29 regulates epidermal and mesenchymal functions in skin repair

open access: yesFEBS Letters, EarlyView.
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan   +10 more
wiley   +1 more source

A cellular system to study responses to a collision between the transcription complex and a protein‐bound nick in the DNA template

open access: yesFEBS Letters, EarlyView.
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring   +6 more
wiley   +1 more source

Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture.
Nidal Hassan Hussein   +2 more
doaj   +1 more source

Quantum probabilistic encryption scheme based on conjugate coding [PDF]

open access: yesarXiv, 2012
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes ...
arxiv  

Homomorphic Encryption

open access: yesProcedia Computer Science, 2013
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique   +2 more
openaire   +1 more source

STAT3 expression is reduced in cardiac pericytes in HFpEF and its loss reduces cellular adhesion and induces pericyte senescence

open access: yesFEBS Letters, EarlyView.
Heart failure with preserved ejection fraction (HFpEF) accounts for half of the heart failure cases. It is characterised by microvascular dysfunction, associated with reduced pericyte coverage and diminished STAT3 expression in pericytes. Loss of STAT3 impairs pericyte adhesion, promotes senescence, and activates a pro‐fibrotic gene program.
Leah Rebecca Vanicek   +15 more
wiley   +1 more source

An Image Identification Scheme of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services [PDF]

open access: yes, 2019
We propose an image identification scheme for double-compressed encrypted JPEG images that aims to identify encrypted JPEG images that are generated from an original JPEG image. To store images without any visual sensitive information on photo sharing services, encrypted JPEG images are generated by using a block-scrambling-based encryption method that
arxiv   +1 more source

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells

open access: yesMolecular Oncology, EarlyView.
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi   +3 more
wiley   +1 more source

A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes

open access: yesIEEE Access, 2019
Unobtrusive personal data collection by wearable sensors and ambient monitoring has increased concerns about user privacy. Applying cryptography solutions to resource constraint wireless sensors as one of the privacy-preserving solutions demand ...
Masoumeh Sharafi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy