Results 11 to 20 of about 2,844 (221)

Innate immune receptor NOD2 mediates LGR5+ intestinal stem cell protection against ROS cytotoxicity via mitophagy stimulation [PDF]

open access: yes, 2020
International audienceThe nucleotide-binding oligomerization domain-containing protein 2 (NOD2) agonist muramyl dipeptide (MDP), a peptidoglycan motif common to all bacteria, supports leucine-rich repeat-containing G protein-coupled receptor 5 (LGR5 ...
Deutsch, Eric   +6 more
core   +4 more sources

Ccdc11 is a novel centriolar satellite protein essential for ciliogenesis and establishment of left-right asymmetry [PDF]

open access: yes, 2016
The establishment of left–right (L-R) asymmetry in vertebrates is dependent on the sensory and motile functions of cilia during embryogenesis. Mutations in CCDC11 disrupt L-R asymmetry and cause congenital heart disease in humans, yet the molecular and ...
Betleja, Ewelina   +8 more
core   +2 more sources

BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]

open access: yesJournal of Engineering Science and Technology, 2017
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj  

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]

open access: yes, 2019
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco   +3 more
core   +4 more sources

Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead [PDF]

open access: yes, 2015
While video surveillance systems have become ubiquitous in our daily lives, they have introduced concerns over privacy invasion. Recent research to address these privacy issues includes a focus on privacy region protection, whereby existing video ...
Kurugollu, Fatih   +3 more
core   +2 more sources

Rabbit-256 Optimisation for Secure Blockchain Hashing in IoT-Healthcare Data

open access: yesAl-Khawarizmi Engineering Journal
The recent trend towards the use of a blockchain as a means to guarantee the security of health data has raised concerns with regard to its applicability in Internet of Things (IoT) scenarios due to computationally heavy primitives (e.g.
Khalid Jadaa   +3 more
doaj   +1 more source

Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]

open access: yes, 2015
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core   +2 more sources

A Novel Cipher for Enhancing MAVLink Security: Design, Security Analysis, and Performance Evaluation Using a Drone Testbed

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs) are being widely deployed for diverse applications, including surveillance, agriculture, logistics, disaster response, etc.
Bhavya Dixit   +5 more
doaj   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy