Results 51 to 60 of about 88,610 (249)

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

AUTOMATING THE DATA SECURITY PROCESS [PDF]

open access: yesJournal of Defense Resources Management, 2017
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc.
Florin Ogigau-Neamtiu
doaj  

Data Security Protection in Cloud Computing by using Encryption [PDF]

open access: yesKirkuk Journal of Science, 2017
Cloud computing is a paradigm for offer information technology services on the Internet, such as hardware, software, networking and also the storage can be accessed anywhere at any time on a pay-per-use basis.
Asst. Lec. Ghassan Sabeeh Mahmood
doaj   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

open access: yesIET Blockchain
The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision‐making, innovation, and improving the efficiency of ...
Aditya Kumar Sharma   +3 more
doaj   +1 more source

Secret Channel using Video Steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence.
Lee Kar Yee, Chuah Chai Wen
doaj   +1 more source

Multipath Data Storage by Third-Order Nonlinear Optical Properties in Zinc Oxide Nanostructures

open access: yesApplied Sciences, 2020
Simultaneous activation of multiphotonic absorption and nonlinear optical refraction were employed for developing a multipath load balancing technique assisted by light and zinc oxide nanostructures.
Federico Ortíz-Trejo   +4 more
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Application of novel security technique in cloud environment using attribute dependent authentication for health care

open access: yesAutomatika
Users of the cloud have been given access to high-quality, on-demand services, without being concerned about the sustaining infrastructure and software. While increasing the security concerns for private and confidential information, this brings emphasis
D. Deena Rose, C. Agees Kumar
doaj   +1 more source

Home - About - Disclaimer - Privacy