Results 41 to 50 of about 891,343 (292)

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Improvement of JPEG XT Floating-Point HDR Image Coding Using Region Adaptive Prediction

open access: yesIEEE Access, 2018
Displays capable of representing high-dynamic range (HDR) images were recently released in the digital consumer electronics market, and consumers have become increasingly interested in HDR images.
Oh-Jin Kwon   +2 more
doaj   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

Complex-valued interferometric inverse synthetic aperture radar image compression base on compressed sensing

open access: yesThe Journal of Engineering, 2014
Complex-valued interferometric inverse synthetic aperture radar (InISAR) image compression is discussed in this study. The target scene has its continuity and is compressible.
Liechen Li   +3 more
doaj   +1 more source

Steganography based on quotient value differencing and pixel value correlation

open access: yesCAAI Transactions on Intelligence Technology, 2021
Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images. Most PVD‐based techniques have a fall‐off boundary problem (FOBP). To avoid FOBP, a steganographic scheme is presented that combines the quotient value difference
Reshma Sonar, Gandharba Swain
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Image Coding Using Wavelet Theory

open access: yesJournal of Engineering and Sustainable Development, 2007
In this paper image coding for (Computer Generated Hologram) CGH technique, is investigated ideal analysis is undertaking to build and to constructed hologram by using wavelet theory and the images taking in to construction binary cell oriented ...
Mothana Amaar Hassan
doaj  

フラクタル符号化特徴量を用いた類似画像検索およびオブジェクト検出手法の検討 [PDF]

open access: yes, 2019
Fractal image coding is a block-based scheme that exploits the self-similarity hiding with an image. Fractal codes are quantitative measurements of the self-similarity of the image, and collage error distribution of block characterizes the degree of self-
鶴見, 智
core  

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography

open access: yesIET Information Security, 2021
Researchers have put forward many variations of schemes for secret image sharing on grounds of visual cryptography and polynomials. The authors of this paper put forward a novel scheme for sharing multiple secret images with perfect reconstruction and ...
Krishnaraj Bhat   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy