Results 61 to 70 of about 8,674 (276)
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD. +1 more
core +1 more source
A Bibliometric Analysis of Publications in Uremic Toxins From 1991 to 2024
ABSTRACT Background Uremic toxins are a growing area of research in nephrology, with significant implications in the progression and treatment of chronic kidney disease (CKD) and the management of end‐stage kidney disease (ESKD). This bibliometric analysis aims to evaluate the global research trends, key contributors, and the impact of publications in ...
Yuh‐Shan Ho +7 more
wiley +1 more source
A Comparative Analysis of Arabic Text Steganography
Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret information by concealing it in a transferred object such as video,
Reema Thabit +5 more
doaj +1 more source
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva +5 more
wiley +1 more source
A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks
Deep learning has become an essential technique in image steganography. Most of the current deep-learning-based steganographic methods process digital images in the spatial domain.
Shanqing Zhang +4 more
doaj +1 more source
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Comparative performance assessment of deep learning based image steganography techniques
Increasing data infringement while transmission and storage have become an apprehension for the data owners. Even the digital images transmitted over the network or stored at servers are prone to unauthorized access.
Varsha Himthani +5 more
doaj +1 more source
AG-Net: An Advanced General CNN Model for Steganalysis
Steganography has made great progress over the past few years due to the advancement of deep convolutional neural networks (DCNNs), which have been successfully used to multi-domains.
Han Zhang +4 more
doaj +1 more source
Blindspot: Indistinguishable Anonymous Communications [PDF]
Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic ...
Gardiner, Joseph, Nagaraja, Shishir
core +1 more source

