Showing 1,501 - 1,520 results of 2,326 for search '"secretion"', query time: 0.05s Refine Results
  1. 1501

    Circulating CD3+HLA-DR+ Extracellular Vesicles as a Marker for Th1/Tc1-Type Immune Responses by Ryutaro Oba, Motomichi Isomura, Akira Igarashi, Kinya Nagata

    Published 2019-01-01
    “…In vitro analysis showed that CD3+CD4+ EVs and CD3+CD8+ EVs were selectively secreted from activated CD4+ and CD8+ T cells, respectively, and that CD3+HLA-DR+ EVs were actively secreted from not only Th1 but also activated CD8+ T (probably mostly Tc1) cells. …”
    Get full text
    Article
  2. 1502

    An Unusual Cause of Coma by Sujith Ovallath, R. S. Raj, Abdu Rahman, A. S. Girija

    Published 2012-01-01
    “…The patient developed a recurrent hypoglycemia possibly secondary to the insulin-like growth factor secreted from the fibroid. The hypoglycemic symptoms disappeared on removal of the fibroid. …”
    Get full text
    Article
  3. 1503

    Genetically Engineered Islets and Alternative Sources of Insulin-Producing Cells for Treating Autoimmune Diabetes: Quo Vadis? by Feng-Cheng Chou, Shing-Hwa Huang, Huey-Kang Sytwu

    Published 2012-01-01
    “…This paper focuses on the genetic manipulation of islets during transplantation therapy and summarizes current strategies to obtain functional insulin-secreting cells from stem/progenitor cells.…”
    Get full text
    Article
  4. 1504

    A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map by Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan

    Published 2014-01-01
    “…The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. …”
    Get full text
    Article
  5. 1505
  6. 1506

    ‘One man’s meat is another man’s poison’. The Rhetoric of Dissent in John Henry Cardinal Newman’s Apologia pro Vita Sua (1864) by Bertrand Lentsch

    Published 2009-12-01
    “…A man who would make amends, to atone for a lambasted decision to abide by a rule, which he now deemed honourable though he then branded it as dishonest, could only be expected to keep his secrets secret. His thereafter feeling impelled to deliver Apologia pro Vita Sua, to rebut the charge of deluding himself and beguiling the throng of well-wishers, raised eyebrows. …”
    Get full text
    Article
  7. 1507

    Yoyo trick on type‐II generalised Feistel networks by Tao Hou, Ting Cui

    Published 2021-11-01
    “…Abstract This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round functions. …”
    Get full text
    Article
  8. 1508

    Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security by Toshiki Matsumine, Hideki Ochiai, Junji Shikata

    Published 2025-01-01
    “…In particular, we begin with a concise overview of their applications to physical layer techniques and then proceed to discuss their use in addressing the challenges of secret message transmission and secret key generation from wireless channels.…”
    Get full text
    Article
  9. 1509

    Monoclonal antibody development and antigenic epitope identification of chicken pro-IL-1β by Mengmeng Xu, Mengmeng Huang, Guodong WANG, Jingzhe HAN, Xinxin NIU, Jinze HAN, Hangbo YU, Yulong ZHANG, Runhang LIU, Ziwen WU, Hongyu Cui, Yanping Zhang, Suyan Wang, Yongzhen Liu, Yuntong Chen, Yulu Duan, Liuan Li, Yulong Gao, Xiaole Qi

    Published 2025-02-01
    “…This study cloned and expressed chicken pro-IL-1β, and developed a hybridoma cell line 1E12 capable of stably secreting chicken pro-IL-1β monoclonal antibody (mAb). …”
    Get full text
    Article
  10. 1510

    Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network by Xiujie Zhang, Xingbing Fu, Lu Hong, Yu Liu, Liangliang Wang

    Published 2020-06-01
    “…More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. …”
    Get full text
    Article
  11. 1511

    Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection by Agnieszka Kraft, Michaela B. Kirschner, Vanessa Orlowski, Manuel Ronner, Caroline Bodmer, Valentina Boeva, Isabelle Opitz, Mayura Meerang

    Published 2025-02-01
    “…In this study, we characterized the transcriptomic profile of EVs secreted by PM primary cells and explored their potential as a biomarker source for PM detection. …”
    Get full text
    Article
  12. 1512

    A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications by L. Anusree, M. Abdul Rahiman

    Published 2022-01-01
    “…Security is one of the major issues in digital image transmission because it can deliver very secret information to any corresponding agency such as the military, biomedical, and security agencies. …”
    Get full text
    Article
  13. 1513

    Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes by Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal

    Published 2021-01-01
    “…For a unidirectional PRE, a master secret security (MSS) has been proposed as another security requirement by Ateniese et al. …”
    Get full text
    Article
  14. 1514

    Making the Past Audible: The Childlike Element and Renewal of Existence in Benjamin and Woolf by Anne-Marie Smith-Di Biasio

    Published 2024-12-01
    “…This allegory of renaissance is also a foundational paradigm in “Anon.” The secret index by which the past is referred to its resurrection and transfigured is further explored in Berlin Childhood and related to Benjamin’s definition in The Theses of the ‘zero hour’ of Stillstellung, which we then read as a moment when listening is suspended and time dislocated in Woolf’s The Waves. …”
    Get full text
    Article
  15. 1515

    MyPyramid Scramble: Meat and Beans by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article
  16. 1516

    MyPyramid Scramble: Meat and Beans by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article
  17. 1517

    MyPyramid Scramble: Great Grains by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article
  18. 1518

    MyPyramid Scramble: Veggie Power! by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article
  19. 1519

    MyPyramid Scramble: Milk and More by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article
  20. 1520

    MyPyramid Scramble: Fantastic Fruits by Linda B. Bobroff

    Published 2010-04-01
    “…Bobroff that provide a list of scrambled words forming names of foods in the MyPyramid groups, with numbered letters that form a secret message. Published by the UF Department of Family Youth and Community Sciences, March 2010.   …”
    Get full text
    Article