Sign Up to like & get
recommendations!
0
Published in 2019 at "European journal of medicinal chemistry"
DOI: 10.1016/j.ejmech.2018.12.004
Abstract: Sulfated hyaluronic acid (sHA) is chemically synthetic mimetic of glycosaminoglycan (GAG) presenting promising biological functions. Specific sulfation pattern, termed as sulfation code plays critical roles in regulating the binding mode between GAG and proteins. As…
read more here.
Keywords:
neurogenesis;
sha sulfation;
sha;
sulfation pattern ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.10.003
Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,…
read more here.
Keywords:
provably secure;
polynomial function;
sha;
hash function ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Ultrasonics sonochemistry"
DOI: 10.1016/j.ultsonch.2018.09.018
Abstract: Hydroxyapatite (Ca10(PO4)6(OH)2, HA) is chemically similar to the mineral component of bones and hard tissues in mammals. Various cations can substitute calcium in the crystal structure of hydroxyapatite. Among them strontium triggers interest, because strontium…
read more here.
Keywords:
function strontium;
aspect ratio;
incorporation;
sha ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Circuits and Systems I: Regular Papers"
DOI: 10.1109/tcsi.2020.2997916
Abstract: Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such designs serves dual purpose, i.e., it enables acceleration of different essential cryptographic primitives (Encryption/Authentication/Pseudo Random Number Generation (PRNG)) and also results in design compaction…
read more here.
Keywords:
crypto coprocessor;
resource;
resource shared;
sha ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Circuits and Systems II: Express Briefs"
DOI: 10.1109/tcsii.2022.3223179
Abstract: This brief proposes and evaluates several OpenCL-based implementations of the Secure Hash Algorithm-3 (SHA-3) co-processor. These implementations are developed based on OpenCL optimization techniques and their impact on throughput and speedup are reported. The experimental…
read more here.
Keywords:
opencl based;
sha;
efficient opencl;
processor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Oncotarget"
DOI: 10.18632/oncotarget.10529
Abstract: Tumor cell-derived hyaluronidase HYAL-1 degrades hyaluronic acid (HA) into angiogenic fragments (AGF: 10-12 disaccharides). AGF support tumor growth and progression. Urine and tissue HAase/HYAL-1 levels are sensitive markers for high-grade bladder cancer (BCa) and its…
read more here.
Keywords:
bladder cancer;
antitumor activity;
sha;
hyaluronic acid ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of athletic training"
DOI: 10.4085/306-20
Abstract: CONTEXT Weakness of the gluteus medius and the gluteus maximus is associated with a variety of musculoskeletal disorders. However, activation of synergist muscles that are not targeted should be considered when prescribing side-lying hip abduction…
read more here.
Keywords:
hip;
log rolling;
weakness;
gluteus medius ... See more keywords