Results 81 to 90 of about 6,557,849 (343)
Ion channel function of polycystin‐2/polycystin‐1 heteromer revealed by structure‐guided mutagenesis
Mutations in polycystin‐1 (PC1) or polycystin‐2 (PC2) cause autosomal‐dominant polycystic kidney disease (ADPKD). We generated a novel gain‐of‐function PC2/PC1 heteromeric ion channel by mutating pore‐blocking residues. Moreover, we demonstrated that PC2 will preferentially assemble with PC1 to form heteromeric complexes when PC1 is co‐expressed ...
Tobias Staudner+7 more
wiley +1 more source
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy.
Alaghband, Mahdi R.+2 more
core +1 more source
A Quantum Key Distribution Protocol with Selecting Announced States, Robust against Photon Number Splitting Attacks [PDF]
We propose a new class of quantum key distribution protocol, that ended up to be robust against photon number splitting attacks in the weak laser pulse implementations. This protocol comprises of BB84 protocol and SARG protocol, especially in aspects of controlling classical sifting procedures of two protocols.
arxiv
The protonated form of butyrate, as well as other short‐chain fatty acids (SCFAs), is membrane permeable. In acidic extracellular environments, this can lead to intracellular accumulation of SCFAs and cytosolic acidification. This phenomenon will be particularly relevant in acidic environments such as the large intestine or tumor microenvironments ...
Muwei Jiang+2 more
wiley +1 more source
International liability and redress for genetically modified organisms and challenge for China's biosafety regulation [PDF]
The UN Cartagena Protocol on Biosafety (Biosafety Protocol) is an international instrument addressing the potential environment and health issues of Genetically Modified Organisms (GMOs).
Xiang, Wen
core
Analysis of the main consensus protocols of blockchain
Blockchain is the core technology of many cryptocurrencies. Blockchain as a distributed ledger technology has received extensive research attention. In addition to cryptography and P2P (peer-to-peer) technology, consensus protocols are also a fundamental
Shijie Zhang, Jong-Hyouk Lee
doaj
A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks
Resource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on.
Hegde Seema B.+2 more
doaj +1 more source
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp+5 more
wiley +1 more source