نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2016
Anders D. Springborg Elisabeth K. Jensen Bradley K. Taylor Mads U. Werner

Mu-opioid-receptor antagonists have been extensively studied in experimental research as pharmacological tools uncovering mechanisms of pain modulation by the endogenous opioid system. In rodents, administration of high doses of mu-opioid-receptor antagonists after the resolution of an inflammatory injury has demonstrated reinstatement of nociceptive hypersensitivity indicating unmasking of lat...

2015

Data security is vital to the world we live in, and the foundation that secure communication is built upon is cryptography. Cryptography is a course that is regularly offered at colleges and universities. In our experience, computer science students find that understanding the sophisticated mathematics behind the crypto-systems is a daunting task, while math majors often get lost in the details...

2013
Zhiyou Fu Fengchang Wu Kang Song Ying Lin Yingchen Bai Yuanrong Zhu John P. Giesy

In order to better understand the influence and mechanism of soil-derived humic acid (SHA) on adsorption of P onto particles in soils, the amounts of PO4 adsorbed by synthetic goethite (a-FeOOH) were determined at different concentrations of SHA, pH, ionic strength and order of addition of adsorbents. Addition of SHA can significantly reduce the amount of PO4 adsorption as much as 27.8%. Both g...

Journal: :The European journal of neuroscience 2006
Hua Zhang Yu Fu Christophe Altier Josef Platzer D James Surmeier Ilya Bezprozvanny

Neurons express multiple types of voltage-gated calcium (Ca2+) channels. Two subtypes of neuronal L-type Ca2+ channels are encoded by CaV1.2 and CaV1.3 pore-forming subunits. To compare targeting of CaV1.2 and CaV1.3 L-type Ca2+ channels, we transfected rat hippocampal neuronal cultures with surface-epitope-tagged sHA-CaV1.2 or sHA-CaV1.3a constructs and found that: (i) both sHA-CaV1.2 and sHA-...

2012
Nicky Mouha

The main purpose of science is simplicity, and as we understand more things, everything is becoming simpler. Edward Teller Cryptography is the study of mathematical techniques that ensure the confidentiality and integrity of information. This relatively new field started out as classified military technology, but has now become commonplace in our daily lives. Cryptography is not only used in ba...

2003
JEFFREY L. WATTS

A total of 353 coagulase-negative staphylococcus (CNS) isolates from infected bovine mammary glands were tested for cytolysin production by using the synergistic hemolysin assay (SHA). Overall, 34.6% of CNS isolates were SHA positive. Human-associated, coagulase-negative staphylococcal species contained the greatest number of SHA-positive strains. Milk leukocyte levels expressed as somatic cell...

Journal: :IEICE Transactions 2005
Mitsuhiro Hattori Shoichi Hirose Susumu Yoshida

The security of SHA-0 with various message schedules is discussed in this letter. SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message schedule. For each primitive polynomial, a SHA-0 variant can be constructed. The collision resistance and the near-collision resistance of SHA-0 variants to the Chabaud-Joux attack are evaluated. Moreover, the near-collision resistance of ...

Journal: :Cancer research 2011
Anaid Benitez Travis J Yates Luis E Lopez Wolfgang H Cerwinka Ashraf Bakkar Vinata B Lokeshwar

The tumor cell-derived hyaluronidase (HAase) HYAL-1 degrades hyaluronic acid (HA) into proangiogenic fragments that support tumor progression. Although HYAL-1 is a critical determinant of tumor progression and a marker for cancer diagnosis and metastasis prediction, it has not been evaluated as a target for cancer therapy. Similarly, sulfated hyaluronic acid (sHA) has not been evaluated for bio...

2011
Anaid Benitez Travis J. Yates Luis E. Lopez Wolfgang H. Cerwinka Ashraf Bakkar Vinata B. Lokeshwar

The tumor cell–derived hyaluronidase (HAase) HYAL-1 degrades hyaluronic acid (HA) into proangiogenic fragments that support tumor progression. Although HYAL-1 is a critical determinant of tumor progression and a marker for cancer diagnosis and metastasis prediction, it has not been evaluated as a target for cancer therapy. Similarly, sulfated hyaluronic acid (sHA) has not been evaluated for bio...

Journal: :Sustainability 2021

Since the Keccak algorithm was selected by US National Institute of Standards and Technology (NIST) as standard SHA-3 hash for replacing currently used SHA-2 in 2015, various optimization methods have been studied parallel hardware environments. However, a software environment, is much slower than existing family; therefore, use low limited environment using embedded devices such Wireless Senso...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید