Results 31 to 40 of about 91,416 (288)

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher

open access: yesSensors, 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed   +3 more
doaj   +1 more source

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message.
Rika Ayu Sukmawati   +2 more
doaj   +1 more source

Evaluating the Genetic Overlap Between Congenital Heart Disease and Neuroblastoma Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with congenital heart disease (CHD) have elevated neuroblastoma (NB) risk, potentially due to shared neural crest origins. We analyzed rare exonic de novo single‐nucleotide variants in 702 CHD and 454 NB trios from the Neuroblastoma Epidemiology in North America Study, Gabriella Miller Kids First Program, and a published cohort. Seven
Ji Yun Tark   +7 more
wiley   +1 more source

RT‐PCR–Based Detection of Bone Marrow Involvement in Ewing Sarcoma: Diagnostic Validity and Prognostic Relevance

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background In Ewing sarcoma (EwS), metastases, including those to bone marrow (BM), are the main factors influencing prognosis. Although reverse transcription polymerase chain reaction (RT‐PCR) offers greater sensitivity, the current EWING protocol defines BM metastases solely using light microscopic detection.
Thanh Pham   +13 more
wiley   +1 more source

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

The new normal? Redaction bias in biomedical science

open access: yesRoyal Society Open Science, 2021
A concerning amount of biomedical research is not reproducible. Unreliable results impede empirical progress in medical science, ultimately putting patients at risk.
David Robert Grimes, James Heathers
doaj   +1 more source

Ivan\u27s Letter (Part 1) [PDF]

open access: yes, 1982
The following cipher puzzle appeared in the May 1930 issue of The Enigma, the official publication of the National Puzzlers League. Erik Bodin offered a $10 to the first person to discover the secret message in Ivan\u27s letter, hinting only that the ...
Bodin, Erik
core   +2 more sources

Clinical Correlates of Anxiety and Depression After Diagnosis of a Pediatric Brain Tumor

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The prevalence and clinical correlates of symptoms of anxiety and depression in pediatric patients with brain tumors are not well described. We aimed to identify clinical characteristics that are correlated with elevated symptoms of anxiety and depression following initial diagnosis.
Bryony J. Lucas   +16 more
wiley   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy