Results 111 to 120 of about 72,170 (255)
Kidney size is sex‐dimorphic and regulated by androgens in adult humans and mice. Male mice lacking the main testosterone‐producing enzyme HSD17B3 had reduced testosterone during a short fetal time window, leading to reduced size of kidneys in adults, which were not responsive to high adult testosterone.
Arttu Junnila +14 more
wiley +1 more source
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. [PDF]
Hakeem SAA, El-Gawad MAA, Kim H.
europepmc +1 more source
Bitcoin and its underlying technology Blockchain have become popular in recent years. Designed to facilitate a secure distributed platform without central authorities, Blockchain is heralded as a paradigm that will be as powerful as Big Data, Cloud ...
Akcora, Cuneyt Gurcan +2 more
core
Time‐restricted feeding (TRF) exerts protein‐dependent neuroprotective effects in an MPTP‐induced Parkinson's disease model. In casein‐fed mice, TRF improves gut barrier integrity and reduces neuroinflammation, possibly via modulation of Allobaculum and BCAAs.
Ting Li +12 more
wiley +1 more source
An In‐Depth Characterization of Page Fault Handling in Modern Persistent Memory Systems
ABSTRACT Recent advancements in Persistent Memory (PM) technologies have enabled the integration of such devices directly into the processor's memory hierarchy, allowing them to be accessed via standard load/store instructions. These developments have revived interest in the design and implementation of systems capable of effectively supporting PM.
André Libório +4 more
wiley +1 more source
Straight to Phase III: Model‐informed approach speeds depemokimab clinical development in interleukin‐5‐driven diseases. IL‐5, a key mediator of type 2 inflammation, underlies various diseases, including severe asthma, CRSwNP, EGPA, and HES. Reduction in blood eosinophil count (BEC), a biomarker of IL‐5 activity, is commonly used to evaluate the ...
Chiara Zecchin +6 more
wiley +1 more source
The application of hash chains and hash structures to cryptography
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
openaire +3 more sources
A Chain Key Model Based on Message Hash Chain
To address the issue of key lifespan in key security, a chain key model based on a message hash chain is proposed. This model breaks away from the traditional scheme of generating random keys using random number generators, using plaintext features as a source of randomness, and generates the next key in conjunction with the current key, achieving key ...
Wenbao Jiang +3 more
openaire +1 more source
Data‐Driven Engineering of Thermostable Collagen‐Mimetic Peptoid Triple Helices
Data‐driven active learning discovery of collagen‐mimetic peptoids capable of forming a thermostable collagen‐like triple helix using computational screening followed by experimental validation. ABSTRACT Collagen‐mimetic peptides (CMPs) are engineered molecules designed to replicate the triple‐helical structure of natural collagen.
Alex Berlaga +6 more
wiley +1 more source
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source

