Results 151 to 160 of about 11,893 (260)
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire +1 more source
Lifestyle Behaviors and Cardiotoxic Treatment Risks in Adult Childhood Cancer Survivors
ABSTRACT Background Higher doses of anthracyclines and heart‐relevant radiotherapy increase cardiovascular disease (CVD) risk. This study assessed CVD and CVD risk factors among adult childhood cancer survivors (CCSs) across cardiotoxic treatment risk groups and examined associations between lifestyle behaviors and treatment risks.
Ruijie Li +6 more
wiley +1 more source
A framework for privacy-preserving similarity search of massive multi-party genomic data. [PDF]
Liu J +5 more
europepmc +1 more source
Artificial intelligence for web development: Perspectives from the industry
Abstract As a field, web development is roughly 30 years old, and during this period, it has been transformed several times already as it has moved from static websites to dynamic web applications. Now, with the introduction of Artificial Intelligence (AI), the field is again at the cusp of a transformation as the latest AI tools might change how to ...
Pyry Pohjalainen, Juho Vepsäläinen
wiley +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
An actionable framework for AI‐ready data
Abstract Data is the foundation of AI. Poor‐quality data drive up costs and can lead to hidden problems for AI models, especially in complex fields such as healthcare and manufacturing. Meanwhile, biased data negatively affect the performance of AI models, and untested evaluation datasets can result in false positives or overestimates of model accuracy.
Neil Majithia +3 more
wiley +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Compression‐Tension‐Asymmetry and Stiffness Nonlinearity of Collagen‐Matrigel Composite Hydrogels
Self‐assembled collagen hydrogel matrices are widely used in tissue engineering applications. These matrices stiffen and contract laterally under tension due to fiber alignment and soften and collapse under compression due to fiber buckling. It is demonstrated that filler materials, such as Matrigel, linearize the mechanical behavior of collagen ...
David Böhringer +9 more
wiley +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu +10 more
wiley +1 more source

