Results 231 to 240 of about 130,132 (369)
A novel memristor-based hyperchaotic hybrid encryption system with DNA for image encryption on the Jetson TX2. [PDF]
Ulutas H.
europepmc +1 more source
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff +11 more
wiley +1 more source
Deep learning-based profiling side-channel attacks in SPECK cipher. [PDF]
Hameed F, Alkhzaimi H.
europepmc +1 more source
Experience has shown and the point is forcibly expressed by Yves Gylden, in his "'The Contributions of the Cryptographic Bureaus in the World War", that at leatst an elementary knowledge of cryptanalysis is prerequisite to intelligent cryptography. Those who are responsible for the promulgation of our codes and ciphers, as well as for the promulgation ...
openaire +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source
Information-Theoretic Medical Image Encryption via LLE-Verified Chaotic Keystreams and DNA Diffusion. [PDF]
Al-Dayel I +3 more
europepmc +1 more source
A Nxm Version Of 5X5 Playfair Cipher For Any Natural Language (Urdu As Special Case)
Muhammad Yusuf Salam +3 more
openalex +1 more source
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
Analisis Implementasi Algoritma Keyword Cipher untuk Pengamanan Data
Samuel Lalopua
openalex +2 more sources

