Results 91 to 100 of about 507,576 (358)
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. [PDF]
Astorga J +3 more
europepmc +1 more source
Under environmental changes, the expression level of neuropeptide (NP) and neuropeptide receptor (NPR) genes changes to confer context‐dependent adaptation to the model organism Drosophila melanogaster. Through finding more regulatory elements in the NPR genes in comparison with their ligands (NPs), we found that NPR‐biased transcriptional regulation ...
SeungHeui Ryu +6 more
wiley +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
Exam‐level analysis of lecture capture viewing and student exam performance
This study asks how lecture capture relates to exam performance in biology courses with three noncumulative exams. Mixed‐effects modeling separated between‐students from within‐student effects on exam %. Students who watched more recordings earned higher grades, but viewing spikes above a student's own mean, consistent with cramming, predicted small ...
Kirk Hillsley
wiley +1 more source
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah +8 more
wiley +1 more source
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
ABSTRACT Objective To identify metabolic patterns in the brain and musculoskeletal system of stiff person syndrome spectrum disorders (SPSD) patients over time using PET imaging and evaluate the impact of immune therapy on metabolic activity as a surrogate for treatment response.
Munther M. Queisi +4 more
wiley +1 more source
ABSTRACT Objective Prognostication of disease course and prediction of treatment response in multiple sclerosis is an unmet need. We compared the performance of serum neurofilament light chain Z scores (age‐ and BMI‐adjusted) with absolute concentrations for the prediction of response to disease‐modifying therapy.
Maximilian Einsiedler +43 more
wiley +1 more source
CP-ABE Scheme Supports Fully Policy and Attribute Hidden [PDF]
The existing ciphertext-policy attribute-based encryption schemes that support policy or attribute hiding can achieve fine-grained access control for privacy protection,but most of them only realize partial policy hiding of attribute values,and ignore ...
JIANG Luhan, TIAN Youliang, XIANG Axin
doaj +1 more source
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source

