Results 31 to 40 of about 486,035 (154)

The Neuromodulator Adenosine Regulates Oligodendrocyte Migration at Motor Exit Point Transition Zones [PDF]

open access: yes, 2019
During development, oligodendrocyte progenitor cells (OPCs) migrate extensively throughout the spinal cord. However, their migration is restricted at transition zones (TZs).
Coughenour, Patricia   +6 more
core   +2 more sources

Lewis Carrol and Iris Murdoch: dialigue after a century [PDF]

open access: yes, 2013
The article dwells upon influences of L.Carroll’s Alice in Wonderland in Iris Murdoch’s early novel The Flight from the Enchanter. The analysis is conducted in the terms of inheritance and contradiction with the traditional classical 19th c ...
Isakova, M.L.
core  

Wireless networks [PDF]

open access: yes, 2017
This module provides an introduction to wireless networks in general and wireless LANs in particular. It describes and explains what the different wireless technologies are, their main features, security issues, advantages, disadvantages and uses or ...
Salazar Soler, Jorge
core   +1 more source

A Cryptographic Toolbox for Feedback Control Systems [PDF]

open access: yes, 2020
: Feedback control systems consist of components such as sensory systems, state estimators, controllers, and actuators. By transmitting signals between these components across insecure transmission channels, feedback control systems become vulnerable to ...
Solnør, Petter
core   +1 more source

Multidimensional linear cryptanalysis [PDF]

open access: yes, 2010
Linear cryptanalysis is an important tool for studying the security of symmetric ciphers. In 1993 Matsui proposed two algorithms, called Algorithm 1 and Algorithm 2, for recovering information about the secret key of a block cipher.
Hermelin, Miia
core  

セキュアRFIDタグチップの設計論 [PDF]

open access: yes, 2017
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms.
Shugo Mikami, 三上 修吾
core   +2 more sources

Further Cracks in the Pi-Code [PDF]

open access: yes, 2000
In Cracking the Pi-Code in the November 1999 issue of Word Ways, David Morice discussed the recreation of looking for words in the decimal digits of pi (3.14159265358979...) with the 10 digits replaced by some set of 10 different letters, as in a ...
Keith, Michael
core   +1 more source

M-health review: joining up healthcare in a wireless world [PDF]

open access: yes, 2012
In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to ...
Adams, Carl   +4 more
core   +1 more source

The LIM-only protein FHL2 attenuates lung inflammation during bleomycin-induces fibrosis

open access: yes, 2014
Fibrogenesis is usually initiated when regenerative processes have failed and/or chronic inflammation occurs. It is characterised by the activation of tissue fibroblasts and dysregulated synthesis of extracellular matrix proteins.
Alnajar, A. (Abdulaleem)   +7 more
core   +1 more source

CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]

open access: yes
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core  

Home - About - Disclaimer - Privacy