Results 71 to 80 of about 10,030,622 (339)

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Experimental study of flow friction behavior in coiled tubing

open access: yesEnergy Reports, 2022
Coiled tubing (CT) technology has been widely applied in well cleanouts, drilling plug, and shale oil and gas fracturing. Fluid flow in CT produce a more significant flow friction pressure loss because of the long length and small tubing diameter coiled ...
Shihui Sun   +3 more
doaj   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security

open access: yesIACR Transactions on Symmetric Cryptology
This paper examines the security of Rocca, an authenticated encryption algorithm designed for Beyond 5G/6G contexts. Rocca has been revised multiple times in the initialization and finalization for security reasons.
Ryunouchi Takeuchi   +2 more
doaj   +1 more source

The role of histone modifications in transcription regulation upon DNA damage

open access: yesFEBS Letters, EarlyView.
This review discusses the critical role of histone modifications in regulating gene expression during the DNA damage response (DDR). By modulating chromatin structure and recruiting repair factors, these post‐translational modifications fine‐tune transcriptional programmes to maintain genomic stability.
Angelina Job Kolady, Siyao Wang
wiley   +1 more source

Continuity Culture: A Key Factor for Building Resilience and Sound Recovery Capabilities [PDF]

open access: yes, 2015
This article investigates the extent to which Jordanian service organizations seek to establish continuity culture through testing, training, and updating of their business continuity plans. A survey strategy was adopted in this research.
A Agnala   +44 more
core   +1 more source

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

WSN key recovery attack based on symmetric matrix decomposition

open access: yesTongxin xuebao, 2018
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI   +5 more
doaj  

Examining the uptake of low-carbon approaches within the healthcare sector: case studies from the National Health Service in England [PDF]

open access: yes, 2015
The National Health Service (NHS) in the UK, is one of the largest organisations in Europe and indeed the world. It therefore has a significant ecological footprint.
Baddley, Jerome   +2 more
core   +2 more sources

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

open access: yesIEEE Transactions on Dependable and Secure Computing, 2015
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to deception, notably in the form of attacks carefully constructed to evade detection. Various learning
Estévez Tapiador, Juan Manuel   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy