Results 61 to 70 of about 32,391 (267)
Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino+3 more
core +1 more source
Background: Weakness of gluteus medius (Gmed) is related with musculoskeletal disorders. Individuals who experience weakness in the Gmed may activate the tensor fasciae latae (TFL) as a compensatory mechanism. Application of isometric hip extension (IHE)
Sae-hwa Kim+4 more
doaj +1 more source
Exposure to second-hand aerosol produced by electronic cigarettes: a systematic review
Background Since 2007, the use of electronic cigarettes has grown rapidly around the world. This trend raises concerns about the potential exposure of bystanders to aerosols from electronic cigarettes, particularly considering that its use in public ...
Esteve Fernández+4 more
doaj +1 more source
Background Globally, a surge in electronic cigarette (e-cigarette) use has been observed in recent years, with youth being the most susceptible group.
Abdullah Alnajem+8 more
doaj +1 more source
D‐galactose (D‐gal) induced inner ear hair cell senescence by inhibiting TFEB transcription. RONIN/HCF1 promotes TFEB transcription to prevent cochlear HCs from D‐gal‐induced senescence through autophagy activation. Abstract Age‐related hearing loss is characterized by senescent inner ear hair cells (HCs) and reduced autophagy.
Yongjie Wei+18 more
wiley +1 more source
Background The first COVID-19 cases were diagnosed in Australia on 25 January 2020. Initial epidiemiology showed that the majority of cases were in returned travellers from overseas. One aspect of Public Health response was to introduce compulsory 14 day
Penelope Fotheringham+7 more
doaj +1 more source
Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System [PDF]
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves as a crucial element in linking blocks within the blockchain, ensuring the integrity of block contents.
arxiv +1 more source
AAVR Expression is Essential for AAV Vector Transduction in Sensory Hair Cells
Decreased sensitivity to AAV vector transduction in the outer hair cells (OHCs) of adult mice is primarily attributed to reduction of AAVR (Kiaa0319l; Au040320). Knockout of AAVR reduces AAV vector transduction efficiency in both inner hair cells (IHCs) and OHCs in neonatal mice.
Fan Wu+8 more
wiley +1 more source
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms [PDF]
Over the recent months it has become clear that the current generation of cryptographic hashing algorithms are insufficient to meet future needs. The ASH family of algorithms provides modifications to the existing SHA-2 family. These modifications are designed with two main goals: 1) Providing increased collision resistance. 2) Increasing mitigation of
arxiv
A new strategy for revitalizing aged biofilms using the elastic deformation of biomass‐based flexible carbon aerogel is proposed. The elastic deformation removes the nonelectrogenic bacteria and the dead electrogenic bacteria, as well as a lot of loosely bound extracellular polymer materials.
Xue Liu+15 more
wiley +1 more source