Results 61 to 70 of about 21,521,866 (302)

Dynamic SHA-2 [PDF]

open access: yes, 2008
In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new ...
Xu Zijie
core  

A Gallbladder‐Specific Hydrophobic Bile Acid‐FXR‐MUC1 Signaling Axis Mediates Cholesterol Gallstone Formation

open access: yesAdvanced Science, EarlyView.
Under hydrophobic bile acid pools, a “Western‐style” diet induces NAFLD and elevated bile CSI, simultaneously activating intestinal FXR to increase circulating ceramide. Hydrophobic bile acids trigger gallbladder FXR‐miR30c/e signaling, causing SDPR suppression and caveolae instability.
Hongtan Chen   +7 more
wiley   +1 more source

Identification of potential antigenic peptides of Brucella through proteome and peptidome

open access: yesVeterinary Medicine and Science, Volume 9, Issue 1, Page 523-534, January 2023., 2023
Based on proteomics and peptidomics, we identified 35 peptides from the Brucella proteome, which have the ability to bind MHC molecules and have the potential to be used in vaccine design. In addition, we also found four Brucella proteins containing the identified MHC‐I and MHC‐II binding peptides, which may be good candidate targets for designing ...
Meijuan Pei   +10 more
wiley   +1 more source

Role of nucleus accumbens dopamine 2 receptors in motivating cocaine use in male and female rats prior to and following the development of an addiction-like phenotype

open access: yesFrontiers in Pharmacology, 2023
A hallmark of cocaine use disorder (CUD) is dysfunction of dopamine signaling in the mesolimbic pathway, including impaired dopamine 2 (D2) receptor signaling.
Eleanor Blair Towers   +4 more
doaj   +1 more source

Turbo SHA-2 [PDF]

open access: yes, 2007
In this paper we describe the construction of Turbo SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but the new hash function has three times more chaining variables, it is more robust and ...
Danilo Gligoroski, Svein Johan Knapskog
core  

Comparison of hash function algorithms against attacks: a review [PDF]

open access: yes, 2018
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation.
Abas, Hafiza   +5 more
core   +1 more source

Spatiotemporal Transcriptomic Profiling Reveals the Dynamic Immunological Landscape of Alveolar Echinococcosis

open access: yesAdvanced Science, EarlyView.
An unprecedented high‐resolution spatial atlas of the E. multilocularis infection foci is obtained, revealing the dynamic functions of neutrophils, Spp1+ macrophages, and fibroblasts during disease progression. The transition of parasite control strategy from “active killing” to “negative segregation” by the host may provide instructive insights into ...
Zhihua Ou   +35 more
wiley   +1 more source

RONIN/HCF1‐TFEB Axis Protects Against D‐Galactose‐Induced Cochlear Hair Cell Senescence Through Autophagy Activation

open access: yesAdvanced Science, EarlyView.
D‐galactose (D‐gal) induced inner ear hair cell senescence by inhibiting TFEB transcription. RONIN/HCF1 promotes TFEB transcription to prevent cochlear HCs from D‐gal‐induced senescence through autophagy activation. Abstract Age‐related hearing loss is characterized by senescent inner ear hair cells (HCs) and reduced autophagy.
Yongjie Wei   +18 more
wiley   +1 more source

A Survey: Secure Data Storage Techniques in Cloud Computing [PDF]

open access: yes, 2015
Cloud computing is an era of research where we are looking for a fast and efficient computing solution with dynamic data. Cloud computing provide us a service which is use and pay on demand services, thus the user can have multiple options for data ...
, Rakhi Emelaya, Dr. Sanjay Agrawal
core   +2 more sources

AAVR Expression is Essential for AAV Vector Transduction in Sensory Hair Cells

open access: yesAdvanced Science, EarlyView.
Decreased sensitivity to AAV vector transduction in the outer hair cells (OHCs) of adult mice is primarily attributed to reduction of AAVR (Kiaa0319l; Au040320). Knockout of AAVR reduces AAV vector transduction efficiency in both inner hair cells (IHCs) and OHCs in neonatal mice.
Fan Wu   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy