Results 71 to 80 of about 32,391 (267)
In this paper, we investigate the application of signal‐to‐leakage‐plus‐noise ratio (SLNR) beamforming to low Earth orbit non‐terrestrial networks. The SLNR criterion aims at maximizing the received desired signal power for each user while minimizing the overall interference power caused by each user to all other co‐channel receivers. We show that such
M. Rabih Dakkak+3 more
wiley +1 more source
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family [PDF]
We perform a combinatorial analysis of SHA-2 compression function. This analysis explains in a unified way the recent attacks against reduced round SHA-2. We start with a general class of local collisions and show that the previously used local collision
Palash Sarkar, Somitra Kumar Sanadhya
core
Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against ...
Arif Iftikhar Khan+8 more
doaj +1 more source
The AuCu@CuO2 aerogels demonstrate favorable photothermal properties, four types of enzyme‐like activities, and H2O2/O2 self‐supplying to modulate the complex microenvironment of MRSA‐infected diabetic wounds. The results indicate that the AuCu@CuO2 aerogel can be activated by the microenvironment of diabetic wound infection, alleviating inflammation ...
Xiaofeng Tan+10 more
wiley +1 more source
The Digital Signature Scheme MQQ-SIG [PDF]
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles+6 more
core +1 more source
DeepTFBS leverages deep learning to predict transcription factor binding sites across species, integrating multi‐task and transfer learning approaches to improve performance in data‐scarce scenarios. This study demonstrates enhanced accuracy in intra‐ and cross‐species prediction, revealing conserved regulatory patterns and functional variants.
Jingjing Zhai+8 more
wiley +1 more source
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network. However, COPE leaves risks for attackers easily getting the private information saved in the packets, when they move through the network to ...
Bahri, Leila+3 more
core +1 more source
Asymmetric Intramolecular α‐Arylation of Polar Amino Acids Bearing β‐Leaving Groups
Use of enolate chemistry to functionalise amino acids with β‐heteroatom side‐chains (serine, cysteine, threonine, etc.) is hampered by β‐elimination. We show that α‐arylation can be achieved by incorporating the side chain into a saturated heterocycle, making the unwanted elimination a disfavoured 5‐endo‐trig reaction.
Ömer Taspinar+6 more
wiley +2 more sources
Using microfluidic models of capillary networks, this study discovered that fluid shear stresses on circulating tumor cells transiting through capillary‐sized bifurcations shed a novel class of shear‐dependent large extracellular vesicle, “shearosomes”, whose proteome comprises of over 3000 distinct proteins.
Angelos Vrynas+16 more
wiley +1 more source
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is
Agoujil, S.+3 more
core +1 more source