Results 51 to 60 of about 15,292 (300)

Two Faces of NOTCH1 in Childhood Lymphoblastic T‐Cell Neoplasia: Prognostic Divergence of Mutational and Structural Aberrations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider   +4 more
wiley   +1 more source

Image vaccine against steganography in encrypted domain

open access: yesScientific Reports
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj   +1 more source

Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]

open access: yes, 2020
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee   +7 more
core  

Time Toxicity in Wilms Tumor: Quantifying the Burden of Healthcare Interaction in the First Year After Diagnosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Wilms tumor (WT) treatment imposes a significant time burden on patients and their families. Time toxicity is a patient‐centered metric that quantifies the burden of healthcare interaction. We sought to define time toxicity in the first year after diagnosis of WT and hypothesized that it would increase as tumor stage and treatment ...
Caleb Q. Ashbrook   +6 more
wiley   +1 more source

End-to-End Image Steganography Using Deep Convolutional Autoencoders

open access: yesIEEE Access, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Nandhini Subramanian   +4 more
semanticscholar   +1 more source

Increased Risk of Sarcomas in Children With Congenital Anomalies: Findings From the Genetic Overlap Between Anomalies and Cancer in Kids (GOBACK) Registry Linkage Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric sarcomas are a heterogeneous group of tumors that contribute disproportionately to cancer mortality in children. Although congenital anomalies are among the strongest known risk factors for childhood cancer, the risk of specific sarcoma subtypes among affected individuals has not yet been thoroughly evaluated. Procedure We
Russ Wolters   +17 more
wiley   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

StegaStyleGAN: Towards Generic and Practical Generative Image Steganography

open access: yesAAAI Conference on Artificial Intelligence
The recent advances in generative image steganography have drawn increasing attention due to their potential for provable security and bulk embedding capacity.
Wenkang Su, J. Ni, Yiyang Sun
semanticscholar   +1 more source

A combination of least significant bit and deflate compression for image steganography

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2022
Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where ...
H. Tayyeh, Ahmed Sabah Ahmed AL-Jumaili
semanticscholar   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

open access: yes, 2007
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Moulin, Pierre, Wang, Ying
core   +4 more sources

Home - About - Disclaimer - Privacy