Results 61 to 70 of about 14,780 (307)
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source
A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System
Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks.
Mei Ling Phang, Swee Huay Heng
doaj +1 more source
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan +5 more
doaj +1 more source
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
Image steganography constitutes a specific form of steganography wherein an image is employed as the concealing medium. Medical Image Steganography represents a distinctive subfield within the broader domain of Image Steganography.
Hayder A. Hadi +2 more
doaj +1 more source
Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions
Recently, more and more steganography tools are exploited to embed malicious code into images by attackers, which bring harm to society. Thus, it has been a tricky problem, for which needs to detect the stego-images correctly.
Pengjie Cao +3 more
doaj +1 more source
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu +6 more
doaj +1 more source
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
High-Capacity Image Steganography Based on Improved Xception
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan +4 more
doaj +1 more source
This study reveals how the mitochondrial protein Slm35 is regulated in Saccharomyces cerevisiae. The authors identify stress‐responsive DNA elements and two upstream open reading frames (uORFs) in the 5′ untranslated region of SLM35. One uORF restricts translation, and its mutation increases Slm35 protein levels and mitophagy.
Hernán Romo‐Casanueva +5 more
wiley +1 more source

