Results 41 to 50 of about 133,735 (361)

A New Lightweight Stream Cipher Based on Chaos

open access: yesSymmetry, 2019
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified
Lina Ding   +3 more
semanticscholar   +1 more source

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

De novo variants of IRF2BPL result in developmental epileptic disorder

open access: yesOrphanet Journal of Rare Diseases
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang   +8 more
doaj   +1 more source

12 Ciphers

open access: yes, 2020
Another prime mover in the development of computers was cryptography – and in particular the breaking of German military codes during the second world war. It was this activity which really led to the modern computer era.
openaire   +2 more sources

Patient Activation in Childhood, Adolescent, and Young Adult Cancer Survivors: Current Insights and Implications for Survivorship Care—A Systematic Review From the e‐QuoL Project

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Patient activation—encompassing knowledge, confidence, and skills in managing individual's health—is a cornerstone of person‐centered care. However, its significance among childhood, adolescent, and young adult cancer survivors (CAYACS) remains unexplored. This article examines the application of the 13‐item Patient Activation Measure (
Charlotte Demoor‐Goldschmidt   +12 more
wiley   +1 more source

Utility of Computed Tomography Surveillance of Asymptomatic Infection in Children and Young Adults Before Allogeneic Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark   +9 more
wiley   +1 more source

Algoritma Super Enkripsi (Affine Cipher dan Cipher Transposisi Grup Simetri) untuk Mengamankan Pesan Teks

open access: yesKubik, 2022
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Unheard and Under‐Supported: Health‐Related Quality of Life in Children, Adolescents, and Young Adults With Sickle Cell Disease

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia   +7 more
wiley   +1 more source

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy