Results 81 to 90 of about 2,281 (257)
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj +3 more sources
A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive data.
Ahmed EL-YAHYAOUI +1 more
doaj +1 more source
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Searchable encryption can support data user to selectively retrieve the cipher documents over encrypted cloud data by keyword-based search. Most of the existing searchable encryption schemes only focus on the exact keyword search.
Xinrui Ge +4 more
doaj +1 more source
Verified numerical computation for nonlinear equations
This is a kind of a survey paper on verification methods for solving nonlinear equations. Fixed point iterations, Newton-like methods, and methods for nonsmooth equations are explained and discussed.
openaire +5 more sources
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Paraneoplastic Lupus Nephritis in a Child With Neuroblastoma Recurrence
Pediatric Blood &Cancer, EarlyView.
Gabriele Mortari +9 more
wiley +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
As Internet of Things (IoT) technology continues to advance at a rapid pace, smart devices have permeated daily life. Service providers are actively collecting copious numbers of user data, with the aim of refining machine learning models to elevate ...
Rongquan Shi, Lifei Wei, Lei Zhang
doaj +1 more source

