Results 41 to 50 of about 434,441 (275)

IMPLEMENTASI ALGORITMA RIJNDAEL UNTUK KEAMANAN LOGIN (STUDI KASUS: PERANGKAT LUNAK KEUANGAN PEMBERIAN TUNJANGAN DI KANTOR KOPERTIS WILAYAH IV)

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2022
Pada perangkat lunak bagian keuangan pengelolaan pemberian tunjangan di Kopertis Wilayah IV didalamnya menangani data – data sensitif yang tidak boleh diakses oleh orang yang tidak berkepentingan.
Andy Victor Pakpahan   +1 more
doaj   +1 more source

Silicon recovery from silicon-iron alloys by electrorefining in molten fluorides [PDF]

open access: yes, 2013
Electrorefining of a silicon-iron material (Si-4.7at%Fe) in molten NaF-KF at 850°C has been investigated in view of recovering pure Si, using electrochemical techniques, SEM-EDS and ICP-AES analyses.
Bieber, Anne-Laure   +5 more
core   +4 more sources

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Could acute Q fever be causing some cases of pediatric acute encephalitis syndrome in eastern Uttar Pradesh?

open access: yesThe Microbe
Purpose: Q -fever is an underestimated zoonotic infection caused by Coxiella burnetii (CB). Humans are accidental host, and CB infection along with febrile illness also does neurological disorder.
Shahzadi Gulafshan   +9 more
doaj   +1 more source

FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications

open access: yesAutomatika, 2020
Advanced Encryption Standard (AES) is a thriving cryptographic algorithm that can be utilized to guarantee security in electronic information. It remains to uphold to be resistive from most of the attacks.
C. Arul Murugan   +2 more
doaj   +1 more source

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yes, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +1 more source

Detection of circulating tumor DNA in colorectal cancer patients using a methylation‐specific droplet digital PCR multiplex

open access: yesMolecular Oncology, EarlyView.
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto   +8 more
wiley   +1 more source

A partial image encryption scheme based on DWT and texture segmentation

open access: yesCogent Engineering, 2022
nowadays, image encryption is an interesting research area due to the rapid growth of communication technologies and the increasing demands for safeguarding the privacy of the transmitted images as unencrypted images are vulnerable to interception ...
Zainab Noori Ghanim   +1 more
doaj   +1 more source

Monitoring of circulating tumor DNA allows early detection of disease relapse in patients with operable breast cancer

open access: yesMolecular Oncology, EarlyView.
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad   +35 more
wiley   +1 more source

Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm

open access: yesJurnal Teknologi dan Sistem Komputer, 2020
Improved security of short message services (SMS) can be obtained using cryptographic methods, both symmetric and asymmetric, but must remain efficient.
Laurentinus Laurentinus   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy