Results 71 to 80 of about 62,040 (316)

An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing

open access: yesIEEE Access, 2019
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal   +5 more
doaj   +1 more source

Pioglitazone plus (−)‐epigallocatechin gallate: a novel approach to enhance osteogenic performance in aged bone marrow mesenchymal stem cells

open access: yesFEBS Open Bio, EarlyView.
Aged human bmMSCs are seeded in the scaffold. Osteoblastic induction can slightly increase cell's bone‐forming activity to produce bone‐like tissues, shown as the sporadic xylenol orange‐stained spots (the lower left image). Notably, pioglitazone plus EGCG co‐treatment dramatically increases cell's bone‐forming activity and bone‐like tissue production (
Ching‐Yun Chen   +6 more
wiley   +1 more source

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Plasma Proteomic Signatures for Alzheimer's Disease: Comparable Accuracy to ATN Biomarkers and Cross‐Platform Validation

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu   +9 more
wiley   +1 more source

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Decrypting $SO(10)$-inspired leptogenesis

open access: yesNuclear Physics B, 2014
46 pages, 10 figures; v2: Ref.'s added, typos corrected; v3: added fig.
Di Bari, P, Marzola, L, Re Fiorentin, M
openaire   +4 more sources

Diffusion Spectrum Imaging Maps Early Axonal Loss and a Unique Progressive Signal in Neuronal Intranuclear Inclusion Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang   +10 more
wiley   +1 more source

Security of Sensitive Data in Face Recognition System Applications: A Novel Encryption Approach

open access: yesIEEE Access
Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet.
S. Hemalatha   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy