Results 121 to 130 of about 124,770 (378)

Comparative Study between Stream Cipher and Block Cipher using RC4 and Hill Cipher

open access: yesInternational Journal of Computer Applications, 2010
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad   +4 more
openaire   +2 more sources

Circulating tumor cells in metastatic breast cancer patients treated with immune checkpoint inhibitors – a biomarker analysis of the ALICE and ICON trials

open access: yesMolecular Oncology, EarlyView.
In this explorative biomarker analysis, we assessed serial sampling of circulating tumor cells (CTCs) with CellSearch in two randomized trials testing immune checkpoint inhibitors (ICIs) in metastatic breast cancer. Our data demonstrate a prognostic potential of CTCs, most apparent 4 weeks into ICI therapy.
Nikolai Kragøe Andresen   +13 more
wiley   +1 more source

Circulating tumor cells: advancing personalized therapy in small cell lung cancer patients

open access: yesMolecular Oncology, EarlyView.
Small cell lung cancer (SCLC) is an aggressive form of lung cancer that spreads rapidly to secondary sites such as the brain and liver. Cancer cells circulating in the blood, “circulating tumor cells” (CTCs), have demonstrated prognostic value in SCLC, and evaluating biomarkers on CTCs could guide treatment decisions such as for PARP inhibitors ...
Prajwol Shrestha   +6 more
wiley   +1 more source

Use of cipher and cipher-key in carbohydrate nomenclature

open access: yes, 2009
Department of Chemistry, Jadavpur University, Kolkata-700 032, India E-mail : ghoshrina@yahoo.com Manuscript received 27 January 2009, revised 19 May 2009, accepted 19 May 2009 The steric structures of the carbohydrates and related compounds have been concised and generalised through a proposed cipher and cipher-key to make the study easier.
Amalendu Banerjee   +2 more
openaire   +2 more sources

A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer

open access: yesMolecular Oncology, EarlyView.
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini   +11 more
wiley   +1 more source

Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors

open access: yesMolecular Oncology, EarlyView.
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi   +6 more
wiley   +1 more source

Vigenere Cipher: Trends, Review and Possible Modifications

open access: yes, 2016
Vigenere cipher is one of the earliest known polyalphabetic cipher which was considered secure for a very long time until 1917 when friedman and kasiski were able to break it by determining repeating segments of the ciphertext and using it to determine ...
A. Aliyu, A. Olaniyan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy