Results 71 to 80 of about 56,459 (364)

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

A Survey on different techniques of steganography

open access: yesMATEC Web of Conferences, 2016
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj   +1 more source

Unsupervised Steganalysis Based on Artificial Training Sets

open access: yes, 2016
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core   +1 more source

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity

open access: yesFEBS Letters, EarlyView.
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley   +1 more source

Principles and Perspectives of Steganography in Error Correction Codes

open access: yesБезопасность информационных технологий, 2014
The main preference of a steganography in ECC with other types of steganography are listed. Opportunity and relevance of strict mathematical researches for this type of steganography are explained. The goals of a steganography in ECC are listed.
Pavel Vladimirovich Slipenchuk
doaj  

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

open access: yesInformatika, 2016
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj  

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization

open access: yesIEEE Transactions on Dependable and Secure Computing, 2019
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where hidden features (patterns) trained to a normal model, which is only activated by some specific input (called triggers), trick the model into producing unexpected behavior.
Shaofeng Li   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy