Results 71 to 80 of about 62,040 (316)
An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal +5 more
doaj +1 more source
Aged human bmMSCs are seeded in the scaffold. Osteoblastic induction can slightly increase cell's bone‐forming activity to produce bone‐like tissues, shown as the sporadic xylenol orange‐stained spots (the lower left image). Notably, pioglitazone plus EGCG co‐treatment dramatically increases cell's bone‐forming activity and bone‐like tissue production (
Ching‐Yun Chen +6 more
wiley +1 more source
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold +11 more
wiley +1 more source
Improving the security of LSB image steganography
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh +3 more
doaj +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu +9 more
wiley +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Decrypting $SO(10)$-inspired leptogenesis
46 pages, 10 figures; v2: Ref.'s added, typos corrected; v3: added fig.
Di Bari, P, Marzola, L, Re Fiorentin, M
openaire +4 more sources
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
Security of Sensitive Data in Face Recognition System Applications: A Novel Encryption Approach
Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet.
S. Hemalatha +6 more
doaj +1 more source

