Results 51 to 60 of about 23,446 (211)

Fenomena Kehidupan Keturunan Eks Partai Komunis Indonesia Di Kabupaten Banyuwangi Tahun 2018

open access: yesJurnal Darussalam: Jurnal Pendidikan, Komunikasi dan Pemikiran Hukum Islam, 2019
This type of phenomenological qualitative research intends to explore and describe the religious, social and cultural life of people descended from the former Indonesian Communist Party (PKI) in the Banyuwangi Regency. By analyzing interactive model data,
Mundir Mundir
doaj   +1 more source

Insights into factorless translational initiation by the tRNA-like pseudoknot domain of a viral IRES. [PDF]

open access: yesPLoS ONE, 2012
The intergenic region internal ribosome entry site (IGR IRES) of the Dicistroviridae family adopts an overlapping triple pseudoknot structure to directly recruit the 80S ribosome in the absence of initiation factors.
Hilda H T Au, Eric Jan
doaj   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Identification of Toxoplasma gondii cAMP dependent protein kinase and its role in the tachyzoite growth. [PDF]

open access: yesPLoS ONE, 2011
cAMP-dependent protein kinase (PKA) has been implicated in the asexual stage of the Toxoplasma gondii life cycle through assaying the effect of a PKA-specific inhibitor on its growth rate. Since inhibition of the host cell PKA cannot be ruled out, a more
Hitomi Kurokawa   +10 more
doaj   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Differential admixture and introgression in Cerasus hybrid zones at the south rear edge of cool‐temperate C. sargentii and the north leading edge of temperate C. leveilleana

open access: yesPlant Species Biology, Volume 41, Issue 1, January 2026.
Hybrid zones at the north leading edge of temperate species, at the south rear edge of cool‐temperate species, and the core of their ranges were investigated. The results imply that genetic admixture and phenotypic introgression have been facilitated, except for the latter in traits contributing to reproductive isolation, in the hybrid zone at the ...
Teruyoshi Nagamitsu   +2 more
wiley   +1 more source

POSTMEMORY DALAM NOVEL TAPOL KARYA NGARTO FEBRUANA

open access: yesJurnal Poetika, 2019
Narasi balas dendam yang masih terus direproduksi oleh pihak-pihak yang bertikai semakin membuat rekonsiliasi tragedi ’65 berujung pada kemacetan. Kerelaan untuk sa-ling mengakui kesalahan adalah langkah besar dalam usaha rekonsiliasi.
Anna Elfira Prabandari Assa
doaj   +1 more source

Blockchain-based PKI for Crowdsourced IoT Sensor Information [PDF]

open access: yesInternational Conference of Soft Computing and Pattern Recognition, 2018
The Internet of Things is progressively getting broader, evolving its scope while creating new markets and adding more to the existing ones. However, both generation and analysis of large amounts of data, which are integral to this concept, may require ...
Guilherme Vieira Pinto   +2 more
semanticscholar   +1 more source

Green Finance and the Hidden Hand of Algorithmic Planning: Debunking Market Rhetoric in the Age of Climate Governance

open access: yesAntipode, Volume 58, Issue 1, January 2026.
Abstract Green finance is widely hailed as the solution to environmental and capitalist crises, promising to address climate change and secure future returns. Yet, rather than being market‐driven, it increasingly relies on data‐intensive forecasting models and scenarios that resemble economic planning.
Giulia Dal Maso, Alessandro Maresca
wiley   +1 more source

Home - About - Disclaimer - Privacy