Results 71 to 80 of about 459,845 (362)
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to
M. Hasan +10 more
semanticscholar +1 more source
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu +17 more
wiley +1 more source
Three‐dimensional (3D) biological systems have become key tools in lymphoma research, offering reliable in vitro and ex vivo platforms to explore pathogenesis and support precision medicine. This review highlights current 3D non‐Hodgkin lymphoma models, detailing their features, advantages, and limitations, and provides a broad perspective on future ...
Carla Faria +3 more
wiley +1 more source
Using of tiny encryption algorithm in CAN-Bus communication
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj +1 more source
Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of ...
Khaled Suwais, Sally Almanasra
doaj +1 more source
Processing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony +14 more
openaire +3 more sources
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
Effective Caching for the Secure Content Distribution in Information-Centric Networking
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad +2 more
core +1 more source
ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li +3 more
wiley +1 more source
Artificial intelligence in data storage systems
Introduction. The artificial intelligence (AI) performance in data storage systems is considered. When working with data, the advantage of its use both in economic terms and for security is determined. The work objective is the introduction of artificial
V. V. Zhilin, O. A. Safar'yan
doaj +1 more source

