Results 31 to 40 of about 1,293,810 (280)
Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher.
Imam Riadi +2 more
doaj +1 more source
Interrogating the immune landscape of microsatellite stable RAS‐mutated colon cancer
COLOSSUS project RAS‐mutated MSS colon cancer study explored transcriptomics and immune cell density by immunohistochemistry (IHC), Immunoscore (IS), ISIC/TuLIS scores, mutation counts, and detected different prevalences but similar microenvironment composition across immune markers with clinical relevance for future immunotherapy combination ...
Rodrigo Dienstmann +61 more
wiley +1 more source
Pengamanan Data Foto pada Perangkat OS Android Menggunakan Teknik Kriptografi Hill Cipher
Perkembangan teknologi informasi yang semakin cepat perlu dibarengi dengan sistem pengamanan dalam pemanfaatanya. Salah satu diantaranya adalah keamanan data-data file foto (citra) yang di simpan pada perangkat mobile OS android.
Aris Puji Widodo +3 more
doaj +1 more source
Geologic quadrangle map no. 47 [PDF]
Process Steps: 1. Either: a) a Portable Document Format (PDF) version of the map provided the Bureau of Economic Geology, University of Texas at Austin was converted from pdf to Tagged Image File Format (TIFF) or b) a paper map was scanned and saved in ...
Barnes, Virgil E. (Virgil Everett), 1903-1998
core +1 more source
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source
The Design and Usage of the New Data Management Features in NASTRAN [PDF]
Two new data management features are installed in the April 1984 release of NASTRAN. These two features are the Rigid Format Data Base and the READFILE capability.
Brown, W. K., Pamidi, P. R.
core +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Objective: We recently showed that the gender detection tools NamSor, Gender API, and Wiki-Gendersort accurately predicted the gender of individuals with Western given names.
Paul Sebo
doaj +1 more source
JPEG File Interchange Format [PDF]
Standards document describing the JPEG File Interchange ...
Hamilton, Eric
core
Exploring compression techniques for ROOT IO [PDF]
ROOT provides an flexible format used throughout the HEP community. The number of use cases - from an archival data format to end-stage analysis - has required a number of tradeoffs to be exposed to the user.
Bockelman, Brian, Zhang, Zhe
core +3 more sources

