Results 111 to 120 of about 327,487 (331)
Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become
Hsiang-Ying Wang +4 more
doaj +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography.
Albert Ginting +2 more
doaj +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
AUTOMATING THE DATA SECURITY PROCESS [PDF]
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc.
Florin Ogigau-Neamtiu
doaj
RIPK4 function interferes with melanoma cell adhesion and metastasis
RIPK4 promotes melanoma growth and spread. RIPK4 levels increase as skin lesions progress to melanoma. CRISPR/Cas9‐mediated deletion of RIPK4 causes melanoma cells to form less compact spheroids, reduces their migratory and invasive abilities and limits tumour growth and dissemination in mouse models.
Norbert Wronski +9 more
wiley +1 more source
Color Image Encryption using Chaotic Algorithm and 2D Sin-Cos Henon Map for High Security
D.N.V.S.L.S. Indira +5 more
openalex +2 more sources
COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
In a networked microgrid system (NMS), various heterogeneous microgrids are interconnected. A networked microgrid system facilitates a new kind of physical design that provides numerous advantages such as distributed economic optimization, reliability ...
Desh Deepak Sharma
doaj +1 more source
QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption
Cloud computing has revolutionized the digital era by providing a more efficient, scalable, and cost-effective infrastructure. Secure systems that encrypt and protect data before it is transmitted over a network and stored in the cloud benefit the entire
Anish Saini +2 more
doaj +1 more source

