Results 31 to 40 of about 3,027,631 (309)
Water Corrosion Problems and Sustainability of Water Supply Schemes [PDF]
Water supply schemes should be technically and socially sustainable for smooth running, smooth operation and maintenances. Failure in either one of these leads to the whole system failure. Once the system is technically feasible, we can manage its social aspects.
openaire +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Towards a global interpretation of dual nitrate isotopes in surface waters
Modern anthropogenic activities have significantly increased nitrate (NO3−) concentrations in surface waters. Stable isotopes (δ15N and δ18O) in NO3− offer a tool to deconvolute some of the human-made changes in the nitrogen cycle.
J. Venkiteswaran, P. Boeckx, D. Gooddy
semanticscholar +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Identity-based ring signature scheme under standard model
An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption.
ZHANG Yue-yu, LI Hui, WANG Yu-min
doaj +2 more sources
CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang +5 more
doaj +3 more sources
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis
In recent years, the research on ciphertext-policy attribute-based encryption (CP-ABE) scheme design based on learning with errors (LWE) has been a challenging problem, and many researchers have made a lot of attempts at it.
Yunfei Yao +4 more
doaj +1 more source
The massive development of floating plants in floodplain lakes and wetlands in the upper Middle Paraná river in the La Plata basin is environmentally and socioeconomically important. Every year aquatic plant detachments drift downstream arriving in small
A. Dogliotti +3 more
semanticscholar +1 more source
Computation of free surface waves in coastal waters with SWASH on unstructured grids
This paper aims to present the extension of the non-hydrostatic wave-flow model SWASH with the covolume method to build discretization schemes on unstructured triangular grids. Central to this method that is free of spurious pressure modes, is the use of
M. Zijlema
semanticscholar +1 more source

