Learn More
Growing evidence has demonstrated a neuroprotective role of autophagy in Alzheimer's disease (AD). Thus, autophagy has been regarded as a potential therapeutic target, attracting increasing interest in pharmaceutical autophagy modulation by small molecules. We designed a two-cycle screening strategy on the basis of imaging high-throughout screening (HTS)(More)
The biochemical activity of mammals is controlled by an internal timekeeping mechanism driving a clock to run in approximate 24-hour (circadian) cycles. In mammals, this circadian clock is located both in the suprachiasmatic nuclei (SCN) and peripheral oscillators. Recently, microRNAs have emerged as significant players in circadian clock timing. The(More)
Passivity in a VLSI model is an important property to guarantee stable global simulation. Most VLSI models are naturally described as descriptor systems (DSs) or singular state spaces. Passivity tests for DSs, however, are much less developed compared to their non-singular state space counterparts. For large-scale DSs, the existing test based on linear(More)
Cloud has become very important in internet world. Cloud provides storages, platforms which improves the functionality. Cloud storage shows how securely and flexibly we can store and share our data. This technique introduces a special type of encryption called as key-aggregate cryptosystem which allows user to share their data partially across cloud and(More)
ityl or positive realness in a VLSI model is an important property Passivity in a VLSI model is an important property to guarantee sta-to guarantee stable global simulation [3,7]. Existing DS passivity ble global simulation. Most VLSI models are naturally described tests are restrnctive in different aspects. For example, the extended as descriptor systems(More)
Cloud plays the vital role in internet world. Cloud provides storages, platforms which improves the functionality. Cloud storage shows how securely and flexibly we can store and share our data. With the help of keys user can easily and securely share their data over cloud. This introduces Key Aggregate Cryptosystem in which an aggregate key is created using(More)
  • 1