Results 81 to 90 of about 3,667 (257)
Mitophagy, the selective degradation of damaged mitochondria, is crucial for cellular health and function. This study introduces a rapid and efficient flow cytometry method using GFP‐BNIP3L/NIX to accurately quantify mitophagy. Our approach can be adapted to use any fluorescent‐tagged selective autophagy receptor, enabling direct and rapid analysis of ...
Mija Marinković+3 more
wiley +1 more source
Secure lightweight cryptosystem for IoT and pervasive computing. [PDF]
Abutaha M+3 more
europepmc +1 more source
CDK5 interacts with MST2 and modulates the Hippo signalling pathway
By using a yeast‐two‐hybrid system, immune precipitation and a proteomics approach, we identify a novel interaction between CDK5 and MST2, which modulates the mechano‐sensitive Hippo signalling pathway in a liver tumour cell line. MST2 (STK3) is a major upstream kinase in the Hippo signalling pathway, an evolutionary conserved pathway in regulation of ...
Mehak Passi+5 more
wiley +1 more source
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. [PDF]
Tariq U, Ahmed I, Bashir AK, Shaukat K.
europepmc +1 more source
IDMF is a derivative of dimethyl fumarate (DMF) with a unique therapeutic potential at the intersection of psoriasis and multiple sclerosis. Here, we demonstrate that it compares favorably with DMF and its other derivatives, such as Diroximel, in the zebrafish, microglia, and lymphocyte models.
Yulin He+5 more
wiley +1 more source
A Complete Key Management Scheme for LoRaWAN v1.1. [PDF]
Chen X, Lech M, Wang L.
europepmc +1 more source
A potential tumor suppressor role of PLK2 in glioblastoma
PLK2 was consistently downregulated in GBM tissues. Overexpression of PLK2 in GBM cell lines U87MG and U251 reduced their tumorigenic potential and enhanced cell cycle arrest and apoptosis. Suggesting that PLK2 overexpression could potentially be leveraged as a therapeutic strategy to inhibit tumor progression and enhance apoptosis, providing new ...
Xiangping Xia+5 more
wiley +1 more source
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI). [PDF]
Abutaha M, Amar I, AlQahtani S.
europepmc +1 more source
Investigation of Hill Cipher Modifications Based on Permutation and Iteration [PDF]
Two recent Hill cipher modifications which iteratively use interweaving and interlacing are considered. We show that strength of these ciphers is due to non-linear transformation used in them (bit-level permutations). Impact of number of iterations on the avalanche effect is investigated.
arxiv
This study reports the upregulation of ELMO1 and GPR141 in human Fuchs' endothelial corneal dystrophy (FECD) corneal endothelium and ultraviolet A‐induced FECD mice model. A genetic association of an intergenic single nucleotide polymorphism rs918980 present between both genes is observed with FECD in the Indian population.
Susmita Sharma+3 more
wiley +1 more source