Suggested Topics within your search.
Suggested Topics within your search.
- Equity 2
- History 2
- Trusts and trustees 2
- ART / Digital 1
- Archaeological expeditions 1
- Archeology 1
- Collection and preservation 1
- Computer animation 1
- Crimes against 1
- Desertions 1
- Design 1
- Digital cinematography 1
- Dinosaurs 1
- Discovery 1
- Employees 1
- Examinations, questions, etc 1
- FICTION 1
- FICTION / Psychological 1
- FICTION / Thrillers 1
- Fathers and daughters 1
- Fossils 1
- Historical 1
- Intelligence service 1
- Internet advertising 1
- Internet marketing 1
- Law 1
- Miscellanea 1
- Orthopedics 1
- Paleontologists 1
- Pediatric 1
-
1481
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Published 2012-01-01“…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
Get full text
Article -
1482
On a mathematical model of bone marrow metastatic niche
Published 2016-12-01“…The model considers the evolution of the signaling molecules CXCL-12 secreted by osteoblasts (bone cells responsible of the mineralization of the bone) and PTHrP (secreted by tumor cells) which activates osteoblast growth. …”
Get full text
Article -
1483
Effects of the cationic protein poly-L-arginine on airway epithelial cells in vitro
Published 2002-01-01“…Background: Allergic asthma is associated with an increased number of eosinophils in the airway wall. Eosinophils secrete cationic proteins, particularly major basic protein (MBP).…”
Get full text
Article -
1484
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…Technically, the authors show that a short vector of some lattice used in the SDA algorithm gives an algebraic relation between secret parameters. Then, all the secret parameters can be recovered by finding this short vector. …”
Get full text
Article -
1485
BMSCs Regulate Astrocytes through TSG-6 to Protect the Blood-Brain Barrier after Subarachnoid Hemorrhage
Published 2021-01-01“…BMSCs can regulate the activation of astrocytes through secreting TSG-6 in vivo and in vitro to protect BBB.…”
Get full text
Article -
1486
Differential Proliferative Characteristics of Alveolar Fibroblasts in Interstitial Lung Diseases: Regulative Role of IL-1 and PGE2
Published 1994-01-01“…AM from SA and HP patients secreted higher amounts of IL-1α and β compared with controls and compared with Fb from SA and HP patients. …”
Get full text
Article -
1487
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. …”
Get full text
Article -
1488
TNF-α Enhances the Therapeutic Effects of MenSC-Derived Small Extracellular Vesicles on Inflammatory Bowel Disease through Macrophage Polarization by miR-24-3p
Published 2023-01-01“…Human menstrual blood-derived mesenchymal stem cells (MenSCs) and their secreted small extracellular vesicles (EVs) had been proven to relieve inflammation, tissue damage, and fibrosis in various organs. …”
Get full text
Article -
1489
A randomized, double‐blind, placebo‐controlled, multiple dose, parallel study to investigate the effects of a cathepsin S inhibitor in celiac disease
Published 2025-01-01“…Few participants had an increase in gliadin‐specific, IFNγ‐secreting T cells, and the antigen‐specific responses (anti‐tTG and anti‐DGP antibodies) were weaker than expected in both arms. …”
Get full text
Article -
1490
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01“…The Block Scrambling Based Encryption algorithm is then used to encode the secret image, providing an additional layer of security. …”
Get full text
Article -
1491
Gut microbiome diversity as adjuvant marker for immune function
Published 2022-06-01“…In essence, the extracellular matrix of gut mucosal biofilm is a complex network of microbes and their secretions, as well as the host's secretions and signals (mainly mucus/mucin). …”
Get full text
Article -
1492
A Formula Adaptive Pixel Pair Matching Steganography Algorithm
Published 2018-01-01“…This will allow users to embed secret message directly without storing and searching the look-up table. …”
Get full text
Article -
1493
How and why do neurons generate complex rhythms with various frequencies?
Published 1998-01-01“…Using the islet of Langerhans in pancreas as an example, in the second part of this review, we illustrate how insulin secreting β-cells communicate with glucagon secreting α-cells to achieve an optimal insulin release.…”
Get full text
Article -
1494
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01“…An attacker measures SCs using probes as well as antennas and correlates them with secret information, such as secret key bytes, used in a cryptographic processor or analog quantities at the frontend of Internet of Things (IoT) gadgets. …”
Get full text
Article -
1495
Composite paraganglioma-ganglioneuroma with atypical catecholamine profile and phenylethanolamine N-methyltransferase expression: a case report and literature review
Published 2024-01-01“…Pheochromocytomas and paragangliomas (PPGLs) are rare tumors that secrete catecholamines and arise from the adrenal medulla or extra-adrenal sympathetic ganglia. …”
Get full text
Article -
1496
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01“…We demonstrated the coexistence of an S-band CV-QKD signal with fully loaded C+L-band classical signals for the first time. The secret key rate of the S-band QKD system was 986 kbps with the C+L-band WDM signals transmitted through a 20 km G.654.E fiber link. …”
Get full text
Article -
1497
Antimicrobial resistance in clinical <I>Escherichia coli</I> isolates obtained from animals
Published 2022-03-01“…The article presents data on the phenotypic and genotypic characteristics of antimicriobial resistance in Escherichia coli clinical isolates recovered from bovine microbiota (secretions from mammary glands, cervical swabs). 127 Escherichia coli isolates were studied, i.e. 44 from mammary glands secretions and 83 from cervical swabs. …”
Get full text
Article -
1498
Présence du végétal dans The Golden Apples de Eudora Welty
Published 2017-03-01“…This article proposes to examine Eudora Welty’s short story cycle The Golden Apples (1949) in the light of the links (both explicit and secret) between this peculiar narrative form and various questions pertaining to botany : classification, dissemination, proliferation, pollinization, among others.…”
Get full text
Article -
1499
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…On the recipient side, the secret message can be extracted without any error and the original image can be reconstructed losslessly. …”
Get full text
Article -
1500
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…In the present paper, we show that, using the noise flooding technique based on the Rényi divergence, the search MLWE problem with uniform B-bounded secret distribution for 1≤B≪q can still be hard for some seed distributions that are not (even computationally indistinguishable from) the uniform distribution under the standard MLWE assumption. …”
Get full text
Article