Results 71 to 80 of about 1,839,896 (336)

Differential meta-analysis of RNA-seq data from multiple studies [PDF]

open access: yes, 2013
High-throughput sequencing is now regularly used for studies of the transcriptome (RNA-seq), particularly for comparisons among experimental conditions.
Jaffrézic, Florence   +2 more
core   +9 more sources

An Approach to Performing Stability Analysis for Power Transformer Differential Protection: A Case Study [PDF]

open access: gold, 2022
Muhammad Sheryar   +6 more
openalex   +1 more source

DES and Differential Power Analysis The “Duplication” Method [PDF]

open access: yes, 1999
Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the "Differential Power Analysis" (DPA) is probably one of the most impressive and most difficult to avoid.In this paper, we present several ideas to resist this type of attack, and in particular we develop ...
Louis Goubin, Jacques Patarin
openaire   +1 more source

Venous Thromboembolism in Pediatric Bone Sarcoma Patients: A 10‐Year, Single‐Institution Experience Encompassing the COVID‐19 Pandemic

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Osteosarcoma (OS) and Ewing sarcoma (EWS) are the most common primary bone cancers in children, but acute thrombosis is poorly characterized in this population. Our study evaluated the rates of venous thromboembolism (VTE) and associated risk factors in pediatric patients with bone sarcomas treated over a 10‐year period encompassing
Sarah Kappa   +8 more
wiley   +1 more source

Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman

open access: yesCryptography, 2020
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation.
Mark Randolph, William Diehl
doaj   +1 more source

Hybrid Feedback Control Methods for Robust and Global Power Conversion [PDF]

open access: yes, 2015
In this paper, the applicability and importance of hybrid system tools for the design of control algorithms for energy conversion in power systems is illustrated in two hybrid control designs, one pertaining to DC/DC conversion and the other to DC/AC ...
Chai, J, Sanfelice, RG
core   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Software Countermeasures Against Differential Power Analysis [PDF]

open access: yes, 2016
Tato práce se zabývá možnými programovými prostředky k ochraně proti diferenciální odběrové analýze algoritmu AES-128 na AVR mikrokontroleru. Implementace několika možných protiopatření je porovnána s nechráněnou verzí z pohledu bezpečnosti a složitosti ...
Sochůrková Alena
core  

Fluctuations in a diffusive medium with gain

open access: yes, 2013
We present a stochastic model for amplifying, diffusive media like, for instance, random lasers. Starting from a simple random-walk model, we derive a stochastic partial differential equation for the energy field with contains a multiplicative random ...
J. García-Ojalvo   +5 more
core   +1 more source

Soft and Collinear Radiation and Factorization in Perturbation Theory and Beyond [PDF]

open access: yes, 2002
Power corrections to differential cross sections near a kinematic threshold are analysed by Dressed Gluon Exponentiation. Exploiting the factorization property of soft and collinear radiation, the dominant radiative corrections in the threshold region ...
Gardi, Einan
core   +3 more sources

Home - About - Disclaimer - Privacy