Results 31 to 40 of about 1,293,810 (280)

Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2022
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher.
Imam Riadi   +2 more
doaj   +1 more source

Interrogating the immune landscape of microsatellite stable RAS‐mutated colon cancer

open access: yesMolecular Oncology, EarlyView.
COLOSSUS project RAS‐mutated MSS colon cancer study explored transcriptomics and immune cell density by immunohistochemistry (IHC), Immunoscore (IS), ISIC/TuLIS scores, mutation counts, and detected different prevalences but similar microenvironment composition across immune markers with clinical relevance for future immunotherapy combination ...
Rodrigo Dienstmann   +61 more
wiley   +1 more source

Pengamanan Data Foto pada Perangkat OS Android Menggunakan Teknik Kriptografi Hill Cipher

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2016
Perkembangan teknologi informasi yang semakin cepat perlu dibarengi dengan sistem pengamanan dalam pemanfaatanya. Salah satu diantaranya adalah keamanan data-data file foto (citra) yang di simpan pada perangkat mobile OS android.
Aris Puji Widodo   +3 more
doaj   +1 more source

Geologic quadrangle map no. 47 [PDF]

open access: yes, 1978
Process Steps: 1. Either: a) a Portable Document Format (PDF) version of the map provided the Bureau of Economic Geology, University of Texas at Austin was converted from pdf to Tagged Image File Format (TIFF) or b) a paper map was scanned and saved in ...
Barnes, Virgil E. (Virgil Everett), 1903-1998
core   +1 more source

E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov   +3 more
wiley   +1 more source

The Design and Usage of the New Data Management Features in NASTRAN [PDF]

open access: yes, 1984
Two new data management features are installed in the April 1984 release of NASTRAN. These two features are the Rigid Format Data Base and the READFILE capability.
Brown, W. K., Pamidi, P. R.
core   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

How accurate are gender detection tools in predicting the gender for Chinese names? A study with 20,000 given names in Pinyin format

open access: yesJournal of the Medical Library Association, 2021
Objective: We recently showed that the gender detection tools NamSor, Gender API, and Wiki-Gendersort accurately predicted the gender of individuals with Western given names.
Paul Sebo
doaj   +1 more source

JPEG File Interchange Format [PDF]

open access: yes, 2004
Standards document describing the JPEG File Interchange ...
Hamilton, Eric
core  

Exploring compression techniques for ROOT IO [PDF]

open access: yes, 2017
ROOT provides an flexible format used throughout the HEP community. The number of use cases - from an archival data format to end-stage analysis - has required a number of tradeoffs to be exposed to the user.
Bockelman, Brian, Zhang, Zhe
core   +3 more sources

Home - About - Disclaimer - Privacy