Results 101 to 110 of about 230,478 (367)
miRNA‐29 regulates epidermal and mesenchymal functions in skin repair
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan+10 more
wiley +1 more source
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring+6 more
wiley +1 more source
Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing
Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture.
Nidal Hassan Hussein+2 more
doaj +1 more source
Quantum probabilistic encryption scheme based on conjugate coding [PDF]
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes ...
arxiv
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique+2 more
openaire +1 more source
Heart failure with preserved ejection fraction (HFpEF) accounts for half of the heart failure cases. It is characterised by microvascular dysfunction, associated with reduced pericyte coverage and diminished STAT3 expression in pericytes. Loss of STAT3 impairs pericyte adhesion, promotes senescence, and activates a pro‐fibrotic gene program.
Leah Rebecca Vanicek+15 more
wiley +1 more source
An Image Identification Scheme of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services [PDF]
We propose an image identification scheme for double-compressed encrypted JPEG images that aims to identify encrypted JPEG images that are generated from an original JPEG image. To store images without any visual sensitive information on photo sharing services, encrypted JPEG images are generated by using a block-scrambling-based encryption method that
arxiv +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi+3 more
wiley +1 more source
A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes
Unobtrusive personal data collection by wearable sensors and ambient monitoring has increased concerns about user privacy. Applying cryptography solutions to resource constraint wireless sensors as one of the privacy-preserving solutions demand ...
Masoumeh Sharafi+3 more
doaj +1 more source