Results 51 to 60 of about 480,128 (291)

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding

open access: yesSensors, 2022
The double random phase encoding (DRPE) system plays a significant role in encrypted systems. However, it is a linear system that leads to security holes in encrypted systems.
Peiran Tian, Runzhou Su
doaj   +1 more source

A fast branch-and-prune algorithm for the position analysis of spherical mechanisms [PDF]

open access: yes, 2019
The final publication is available at link.springer.comDifferent branch-and-prune schemes can be found in the literature for numerically solving the position analysis of spherical mechanisms.
Alexander Morgan   +9 more
core   +1 more source

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme

open access: yesEntropy, 2020
Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. However, key-dependent dynamic substitution-boxes (S-boxes) assume to improve the security and robustness of the whole cryptosystem.
Musheer Ahmad, Eesa Al-Solami
doaj   +1 more source

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

A Site-Specific Synthetic Route to Substituted Inda(box) Ligands

open access: yesOrganic Letters, 2023
Aminoindanol-derived bis(oxazoline) ligands are widely used in metal-catalyzed transformations, but the synthesis of structural derivatives is challenging. We report the gram-scale, seven-step synthesis of five bromine-functionalized in-da(box) ligands that have varied bridge substituents.
Kimberly A. Alley   +3 more
openaire   +2 more sources

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence

open access: yesEntropy, 2020
Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the ...
Khushbu Khalid Butt   +3 more
doaj   +1 more source

An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping [PDF]

open access: yesSymmetry, 2019
In this paper, we propose to present a novel technique for designing cryptographically strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial mapping is proficient to map the input sequence to a strong 8 × 8 S-box meeting the requirements of a bijective function. The use of cubic polynomial maintains the simplicity of S-
Zahid, Amjad Hussain   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy