Results 51 to 60 of about 260,218 (282)

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

SISTEM VERIFIKASI CITRA TANDATANGAN DENGAN METODE POLA BUSUR TERLOKALISASI

open access: yesMajalah Ilmiah Teknologi Elektro, 2009
Signature is used as a proof of one’s ratification. This important purpose cause attempts of falsifying the signature. Falsifying signature is relatively simple, because most verification was done manually only by comparing the form of each signature ...
A. A. Kompyang Sudana
doaj  

SUSIG: An On-line Handwritten Signature Database, Associated Protocols and Benchmark Results” [PDF]

open access: yes, 2007
In this paper we describe a new online signature database which is available for use in developing or testing signature verification systems. The SUSIG database consists of two parts, collected using different pressure sensitive tablets (one with and ...
Yanikoglu, Berrin, Yanıkoğlu, Berrin
core   +1 more source

Offline Signature Verification by Combining Graph Edit Distance and Triplet Networks

open access: yes, 2018
Biometric authentication by means of handwritten signatures is a challenging pattern recognition task, which aims to infer a writer model from only a handful of genuine signatures.
A Bansal   +13 more
core   +1 more source

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

E-invoice authenticity verification scheme based on signature verification

open access: yes网络与信息安全学报, 2019
With the rapid development of network and information technology, paperless and electronic have become the development trend of today's economic life.
XIE Rongna, MAO Weihua, SHI Guozhen
doaj   +3 more sources

A First Attempt to Cloud-Based User Verification in Distributed System

open access: yes, 2015
In this paper, the idea of client verification in distributed systems is presented. The proposed solution presents a sample system where client verification through cloud resources using input signature is discussed. For different signatures the proposed
Borowik, Grzegorz   +3 more
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing

open access: yesDigital Communications and Networks
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network, so it has promoted the applications of crowd-sensing services in different fields, but also brings more privacy security challenges, the ...
Xu Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy