Results 81 to 90 of about 327,487 (331)
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra +4 more
doaj +1 more source
Effective Caching for the Secure Content Distribution in Information-Centric Networking
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad +2 more
core +1 more source
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas +3 more
wiley +1 more source
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT
This article presents recommendations on the selection of parameters of the encryption algorithm with variable fragmentation of the block, developed on the basis of a study of the obtained results of the algorithm with different encryption parameters (p ...
K. O. Zakharova
doaj +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid
A state estimation-based dynamic encryption and authentication (SEDEA) approach is proposed to protect the communication between the control center (CC) and remote terminal units (RTUs) in the smart grid, including the measurements reported from RTUs and
Ting Liu +4 more
doaj +1 more source
Retracted: Research on High Robust Multimedia Image Encryption Based on Gyrator Transform Domain Model [PDF]
Advances in Multimedia
openalex +1 more source
Plasma membranes contain dynamic nanoscale domains that organize lipids and receptors. Because viruses operate at similar scales, this architecture shapes early infection steps, including attachment, receptor engagement, and entry. Using influenza A virus and HIV‐1 as examples, we highlight how receptor nanoclusters, multivalent glycan interactions ...
Jan Schlegel, Christian Sieben
wiley +1 more source
Implementing the SCAN language by neural networks [PDF]
The real-time encryption of pictures is an important subject for many applications, e.g. television broadcast stations, network security, etc. The paper shows how the previously introduced SCAN encryption method can be easily implemented using binary ...
Brause, Rüdiger W.
core
pH‐mediated activation of the lysosomal arginine sensor SLC38A9
Cells monitor nutrient levels via the lysosomal transporter SLC38A9 to activate the mechanistic target of rapamycin complex 1 (mTORC1). This study reveals that SLC38A9 function is regulated by pH. We identified histidine 544 as a critical pH sensor that undergoes conformational changes to control amino acid efflux from lysosomes; therefore, it ...
Xuelang Mu, Ampon Sae Her, Tamir Gonen
wiley +1 more source

