Results 41 to 50 of about 130,132 (369)
De novo variants of IRF2BPL result in developmental epileptic disorder
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang +8 more
doaj +1 more source
Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq +2 more
doaj +1 more source
Preoperative Cytopenia in Patients Affected by High‐Risk Neuroblastoma: Just a Matter of Platelets?
ABSTRACT Background and Aims In patients affected by high‐risk neuroblastoma (HR‐NB), complete macroscopic resection (CMR) is associated with better outcomes. These patients are often cytopenic due to intensive induction regimens. The aim of the present study is to assess the impact of preoperative cytopenia on surgical outcome in patients with HR‐NB ...
Giorgio Persano +13 more
wiley +1 more source
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara +3 more
doaj +1 more source
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj +1 more source
ABSTRACT Children undergoing allogeneic stem cell transplantation often receive off‐label rituximab treatment for Epstein–Barr virus reactivation, using adult dosing without pediatric evidence. This project aims to develop a clinical decision support tool (CDSS) that provides evidence‐based dosing scenarios by analyzing real‐world patient data.
Birgit Burkhardt +2 more
wiley +1 more source
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed +3 more
doaj +1 more source
PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA
The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message.
Rika Ayu Sukmawati +2 more
doaj +1 more source
ABSTRACT Background The delipid extracorporeal lipoprotein filter from plasma (DELP) treatment can effectively reduce blood lipid, increase blood flow, and improve neurological deficits in patients with acute ischemic stroke (AIS). However, its effect on vision and retinal microcirculation in stroke patients has never been reported.
Ning Li +9 more
wiley +1 more source
Ivan\u27s Letter (Part 1) [PDF]
The following cipher puzzle appeared in the May 1930 issue of The Enigma, the official publication of the National Puzzlers League. Erik Bodin offered a $10 to the first person to discover the secret message in Ivan\u27s letter, hinting only that the ...
Bodin, Erik
core +2 more sources

