Results 31 to 40 of about 486,035 (154)
The Neuromodulator Adenosine Regulates Oligodendrocyte Migration at Motor Exit Point Transition Zones [PDF]
During development, oligodendrocyte progenitor cells (OPCs) migrate extensively throughout the spinal cord. However, their migration is restricted at transition zones (TZs).
Coughenour, Patricia +6 more
core +2 more sources
Lewis Carrol and Iris Murdoch: dialigue after a century [PDF]
The article dwells upon influences of L.Carroll’s Alice in Wonderland in Iris Murdoch’s early novel The Flight from the Enchanter. The analysis is conducted in the terms of inheritance and contradiction with the traditional classical 19th c ...
Isakova, M.L.
core
This module provides an introduction to wireless networks in general and wireless LANs in particular. It describes and explains what the different wireless technologies are, their main features, security issues, advantages, disadvantages and uses or ...
Salazar Soler, Jorge
core +1 more source
A Cryptographic Toolbox for Feedback Control Systems [PDF]
: Feedback control systems consist of components such as sensory systems, state estimators, controllers, and actuators. By transmitting signals between these components across insecure transmission channels, feedback control systems become vulnerable to ...
Solnør, Petter
core +1 more source
Multidimensional linear cryptanalysis [PDF]
Linear cryptanalysis is an important tool for studying the security of symmetric ciphers. In 1993 Matsui proposed two algorithms, called Algorithm 1 and Algorithm 2, for recovering information about the secret key of a block cipher.
Hermelin, Miia
core
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms.
Shugo Mikami, 三上 修吾
core +2 more sources
Further Cracks in the Pi-Code [PDF]
In Cracking the Pi-Code in the November 1999 issue of Word Ways, David Morice discussed the recreation of looking for words in the decimal digits of pi (3.14159265358979...) with the 10 digits replaced by some set of 10 different letters, as in a ...
Keith, Michael
core +1 more source
M-health review: joining up healthcare in a wireless world [PDF]
In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to ...
Adams, Carl +4 more
core +1 more source
The LIM-only protein FHL2 attenuates lung inflammation during bleomycin-induces fibrosis
Fibrogenesis is usually initiated when regenerative processes have failed and/or chronic inflammation occurs. It is characterised by the activation of tissue fibroblasts and dysregulated synthesis of extracellular matrix proteins.
Alnajar, A. (Abdulaleem) +7 more
core +1 more source
CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core

