Results 61 to 70 of about 5,924 (276)

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

Enhance the Hiding Image by Using Compression and Securing Techniques

open access: yesIraqi Journal for Computers and Informatics, 2017
Information security is a huge trending topic in recent year. Many technique and algorithm were designed and developed to achieve the security of information and/or network across the world.
Ahmed S. Farhan   +2 more
doaj   +3 more sources

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Steganography: Forensic, Security, and Legal Issues

open access: yesJournal of Digital Forensics, Security and Law, 2008
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also.
Merrill Warkentin   +2 more
doaj  

Steganography: The Art of Encrypting and Decrypting Information with Different Hiding Tools and Command Prompt

open access: yesInternational Journal For Multidisciplinary Research, 2023
The concealing information within other non-secret data to hide its existence. It involves embedding secret messages or data within innocuous carriers, like images, audio files, or text. This hidden information is often encrypted to enhance security. Steganography focuses on maintaining the secrecy of the communication.
Pushpendra Saini -   +4 more
openaire   +1 more source

Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]

open access: yes, 2012
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel   +1 more
core  

Home - About - Disclaimer - Privacy