Results 111 to 120 of about 133,735 (361)
Cipher Machine Philips Usfa Miniflex_surface meshes (Inv. 2017-413)
Matthias Göggerle
openalex +2 more sources
We present the operation of a 1.5-Gb/s real-time Y-00 quantum stream cipher as an overlay in a modern coherent wavelength-division multiplexed (WDM) transmission system.
F. Futami +6 more
semanticscholar +1 more source
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka +7 more
wiley +1 more source
Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj
Differential cryptanalysis of image cipher using block-based scrambling and image filtering [PDF]
Feng Yu +3 more
openalex +1 more source
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda +15 more
wiley +1 more source
Modern Crypto-Analysis of Polyalphabetic Ciphers Using a Genetic Algorithm
This project involved implementing a genetic algorithm to help automate the crypto-analysis of the Vigenere ...
Heald, Benjamin E.
core
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
IMPLEMENTASI ALGORITMA SUPER ENKRIPSI VIGENERE CIPHER DAN ROUTE CIPHER PADA PENYANDIAN PESAN TEKS
Kemajuan teknologi diiringi dengan meningkatnya ancaman terhadap keamanan serta kerahasiaan informasi pada pesan. Salah satu cara untuk mengamankan pesan dapat menggunakan teknik super enkripsi.
SUSILA BAHRI +2 more
doaj +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source

