Results 101 to 110 of about 31,005 (332)
In this study maize chloroplastic malate dehydrogenase7 (ZmMDH7), is identified as a Rhizoctonia solani resistance gene in maize. ZmMDH7 is regulated by transcription factor ZmWRKY44 via pathogens challenge to elevate mitochondrial ROS and SA signaling pathway.
Luyang Wei +9 more
wiley +1 more source
ABSTRACT The cytosine (C) modifications 5‐methylcytosine (mC) and 5‐hydroxymethylcytosine (hmC) are central regulatory elements of mammalian genomes. Both marks occur in double‐stranded DNA in either strand‐symmetric or ‐asymmetric fashion, but it is still poorly understood how this symmetry information is selectively read out by the nuclear proteome ...
Lena Engelhard +8 more
wiley +1 more source
Stroke‐induced lactate accumulation promotes p300‐mediated lactylation of methyl‐CpG binding protein 2 (MeCP2) at lysine 210, which reprograms microglial metabolism toward glycolysis and activates the hexokinase 2 (HK2)/mTOR axis. This cascade promotes proinflammatory responses and impairs neurofunctional outcomes.
Zengyu Zhang +12 more
wiley +1 more source
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage
Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns.
Geong Sen Poh +6 more
doaj +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
A novel symmetric searchable encryption scheme for string identification in cloud computing [PDF]
Penumalli Divyalekhya
openalex +1 more source
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption [PDF]
Brice Minaud, Michael Reichle
openalex +1 more source
A Closed‐Loop Hybrid Discovery System of Type I Photosensitizers for Hypoxic Tumor Therapy
The work developed a closed‐loop hybrid discovery system to rationally design and predict high‐performance Type I PSs for hypoxic tumor therapy. 664 Potential candidates are identified from a dataset through a support vector machine (SVM) classification model, and two candidates are experimentally verified as Type I PSs, which highlighted the potential
Xia Ling +9 more
wiley +1 more source
Verifiable attribute-based searchable encryption scheme based on blockchain
For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was ...
Xixi YAN +3 more
doaj +2 more sources

