Results 121 to 130 of about 6,410,352 (379)

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

IMAGE ENCRYPTION USING ADVANCED MULTILEVEL ENCRYPTION

open access: yes, 2019
Encryption is a common technique to uphold image security. With the ever increasing growth of multimedia applications, security is an important issue in communication and storage of images encryption is one of the ways to ensure security. Image encryption techniques try to convert original image to another image that is hard to understand, to keep the ...
openaire   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Color image encryption based on finger vein key and off-axis digital holography with phase-modulated reference light

open access: yesScientific Reports
In this paper, a color image encryption method based on finger vein key and off-axis digital holography with phase-modulated reference light is proposed.
Boyu Wang   +8 more
doaj   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Image cryptosystem with image key using integral disproportion

open access: yesРадіоелектронні і комп'ютерні системи
The subject matter of this article is the process of securing visual data through encryption. The goal of this study is to develop a new approach for image encryption and decryption using an image as a key, where security and performance are comparable ...
Viktor Avramenko, Mykyta Bondarenko
doaj   +1 more source

Image Encryption Using Josephus Problem and Filtering Diffusion

open access: yesIEEE Access, 2019
Image encryption is an efficient visual technology to protect private images. This paper develops an image encryption algorithm utilizing the principles of the Josephus problem and the filtering technology.
Zhongyun Hua   +3 more
doaj   +1 more source

YAP1::TFE3 mediates endothelial‐to‐mesenchymal plasticity in epithelioid hemangioendothelioma

open access: yesMolecular Oncology, EarlyView.
The YAP1::TFE3 fusion protein drives endothelial‐to‐mesenchymal transition (EndMT) plasticity, resulting in the loss of endothelial characteristics and gain of mesenchymal‐like properties, including resistance to anoikis, increased migratory capacity, and loss of contact growth inhibition in endothelial cells.
Ant Murphy   +9 more
wiley   +1 more source

Adaptaquin is selectively toxic to glioma stem cells through disruption of iron and cholesterol metabolism

open access: yesMolecular Oncology, EarlyView.
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié   +16 more
wiley   +1 more source

A Joint Encryption and Reversible Data Hiding Scheme Based on Integer-DWT and Arnold Map Permutation

open access: yesJournal of Applied Mathematics, 2014
A joint encryption and reversible data hiding (joint encryption-RDH) scheme is proposed in this paper. The cover image is transformed to the frequency domain with integer discrete wavelet transform (integer DWT) for the encryption and data hiding ...
Shun Zhang, Tiegang Gao, Guorui Sheng
doaj   +1 more source

Home - About - Disclaimer - Privacy