Results 71 to 80 of about 3,621,508 (286)
Loss-tolerant position-based quantum cryptography
Position-based quantum cryptography (PBQC) allows a party to use its geographical location as its only credential to implement various cryptographic protocols. Such a protocol may lead to important applications in practice.
Qi, Bing, Siopsis, George
core +1 more source
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda +15 more
wiley +1 more source
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over ...
Mengxing Li +5 more
doaj +1 more source
Background Evidence showed that Tai Chi may have beneficial effects among hypertensive individuals, although the results are not convincing. We aim to conduct a high-quality clinical trial with 24-h BP measurement to provide robust evidence of Tai Chi ...
Yuxi Li +10 more
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Compatibility in acoustic telemetry
Acoustic telemetry is widely used to investigate aquatic animal movement. Pulse position modulation (PPM) is an acoustic telemetry method that allows multiple unique identification codes to be transmitted at a single acoustic frequency, typically in the ...
Jan Reubens +5 more
doaj +1 more source
On the Complexity of Chore Division
We study the proportional chore division problem where a protocol wants to divide an undesirable object, called chore, among $n$ different players. The goal is to find an allocation such that the cost of the chore assigned to each player be at most $1/n$
Farhadi, Alireza +1 more
core +1 more source
Biallelic Inactivation of NSD1 Associated With Carcinogenesis in Sotos Syndrome
Pediatric Blood &Cancer, EarlyView.
Nicholas A. Borja +8 more
wiley +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Anonymous and authenticated routing protocol for mobile ad hoc networks
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc ...
LI Xiao-qing, LI Hui, MA Jan-feng
doaj +2 more sources

