Results 101 to 110 of about 6,410,352 (379)

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

An image layered scrambling encryption algorithm based on a novel discrete chaotic map

open access: yesIET Image Processing, 2023
At present, the image encryption algorithm based on the bit‐plane has the problem that the encryption speed and the encryption effect cannot be well balanced.
Jianeng Tang   +5 more
doaj   +1 more source

A Novel (k,n) Secret Sharing Scheme from Quadratic Residues for Grayscale Images

open access: yes, 2014
A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the ...
Abdelsatir, El-Tigani B.   +3 more
core   +1 more source

Substrate specificity of Burkholderia pseudomallei multidrug transporters is influenced by the hydrophilic patch in the substrate‐binding pocket

open access: yesFEBS Letters, EarlyView.
Multidrug transporters BpeB and BpeF from the Gram‐negative pathogen Burkholderia pseudomallei have a hydrophilic patch in their substrate‐binding pocket. Drug susceptibility tests and growth curve analyses using an Escherichia coli recombinant expression system revealed that the hydrophilic patches of BpeB and BpeF are involved in the substrate ...
Ui Okada, Satoshi Murakami
wiley   +1 more source

Program Aplikasi Keamanan Citra Dengan Algoritma Des Dan Transformasi Wavelet Diskrit [PDF]

open access: yes, 2012
Application program security image using DES cryptographic algorithm and discrete wavelet transform is an application program that is used to secure image transmission through the Internet.
Bayu, S. (Surarso)   +2 more
core  

DWT-SVD Based Image Steganography Using Threshold Value Encryption Method [PDF]

open access: diamond, 2022
Jyoti Khandelwal   +3 more
openalex   +1 more source

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Image compression and encryption based on wavelet transform and chaos [PDF]

open access: yesКомпьютерная оптика, 2019
With the rapid development of network technology, more and more digital images are transmitted on the network, and gradually become one important means for people to access the information.
Haibo Gao , Wenjuan Zeng
doaj   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption

open access: yesMathematics
This paper proposes a highly secure image encryption technique based on chaotic synchronization. Firstly, through the design of a synchronization controller, we ensure that the master–slave chaotic extremum-coded random number generators (ECRNGs ...
Shunsuke Araki, Ji-Han Wu, Jun-Juh Yan
doaj   +1 more source

Home - About - Disclaimer - Privacy