Results 101 to 110 of about 192,353 (293)
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams ...
Xinyue Zhang +3 more
doaj +1 more source
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies +3 more
wiley +1 more source
Cryptographic key Generation Using Fingerprint Biometrics
At the present time progress of communications technologies has resulted to post large amounts of digital data in the media shared among the people, this has necessitated the development of cryptographic techniques to be one of the building blocks for ...
Huda Ameer
doaj +4 more sources
A synchronous binary array divider [PDF]
An asynchronous binary divider formed of an array of identical logic cells is described. Each cell includes a single bit binary subtractor and a selection gate. The array is connected to divisor, dividend, quotient and remainder registers.
Wang, G. Y.
core +1 more source
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold +11 more
wiley +1 more source
EXTEND-L : an input language for extensible register transfer compilation [PDF]
This report discusses the model and input language for EXTEND, a synthesis system that permits extensible register transfer synthesis. EXTEND-L fills the need for a language that bridges the gap between existing behavioral input descriptions, which are ...
Dutt, Nikil D., Gajski, Daniel D.
core
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li +8 more
wiley +1 more source
OBJECTIVES: The aim of this study was to examine which individual and work-related characteristics predict work outcomes related to sustainable employment among male shift and day workers.
Hardy A van de Ven +6 more
doaj +1 more source
REGISTERS AND ACRONYMS IN BOARDING SCHOOL [PDF]
The paper deals with the technical terms found in the boarding school, which is used some Sanskrit words to name some places and other things and also the acronyms that sound unusual for some people but it is daily used and understood in the military ...
Mukti, Laksananing
core

