Results 71 to 80 of about 3,621,508 (286)

Loss-tolerant position-based quantum cryptography

open access: yes, 2015
Position-based quantum cryptography (PBQC) allows a party to use its geographical location as its only credential to implement various cryptographic protocols. Such a protocol may lead to important applications in practice.
Qi, Bing, Siopsis, George
core   +1 more source

Adjunctive Therapeutic Plasma Exchange in Refractory Adult‐Onset Still's Disease Complicated by Secondary Macrophage Activation Syndrome: A Single‐Center Experience

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda   +15 more
wiley   +1 more source

Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

open access: yesThe Scientific World Journal, 2014
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over ...
Mengxing Li   +5 more
doaj   +1 more source

The effectiveness and safety of Tai Chi for patients with essential hypertension: study protocol for an open-label single-center randomized controlled trial

open access: yesBMC Complementary Medicine and Therapies, 2021
Background Evidence showed that Tai Chi may have beneficial effects among hypertensive individuals, although the results are not convincing. We aim to conduct a high-quality clinical trial with 24-h BP measurement to provide robust evidence of Tai Chi ...
Yuxi Li   +10 more
doaj   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Compatibility in acoustic telemetry

open access: yesAnimal Biotelemetry, 2021
Acoustic telemetry is widely used to investigate aquatic animal movement. Pulse position modulation (PPM) is an acoustic telemetry method that allows multiple unique identification codes to be transmitted at a single acoustic frequency, typically in the ...
Jan Reubens   +5 more
doaj   +1 more source

On the Complexity of Chore Division

open access: yes, 2018
We study the proportional chore division problem where a protocol wants to divide an undesirable object, called chore, among $n$ different players. The goal is to find an allocation such that the cost of the chore assigned to each player be at most $1/n$
Farhadi, Alireza   +1 more
core   +1 more source

Biallelic Inactivation of NSD1 Associated With Carcinogenesis in Sotos Syndrome

open access: yes
Pediatric Blood &Cancer, EarlyView.
Nicholas A. Borja   +8 more
wiley   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Anonymous and authenticated routing protocol for mobile ad hoc networks

open access: yesTongxin xuebao, 2009
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc ...
LI Xiao-qing, LI Hui, MA Jan-feng
doaj   +2 more sources

Home - About - Disclaimer - Privacy