Results 51 to 60 of about 15,292 (300)
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider +4 more
wiley +1 more source
Image vaccine against steganography in encrypted domain
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj +1 more source
Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee +7 more
core
ABSTRACT Background Wilms tumor (WT) treatment imposes a significant time burden on patients and their families. Time toxicity is a patient‐centered metric that quantifies the burden of healthcare interaction. We sought to define time toxicity in the first year after diagnosis of WT and hypothesized that it would increase as tumor stage and treatment ...
Caleb Q. Ashbrook +6 more
wiley +1 more source
End-to-End Image Steganography Using Deep Convolutional Autoencoders
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Nandhini Subramanian +4 more
semanticscholar +1 more source
ABSTRACT Background Pediatric sarcomas are a heterogeneous group of tumors that contribute disproportionately to cancer mortality in children. Although congenital anomalies are among the strongest known risk factors for childhood cancer, the risk of specific sarcoma subtypes among affected individuals has not yet been thoroughly evaluated. Procedure We
Russ Wolters +17 more
wiley +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
StegaStyleGAN: Towards Generic and Practical Generative Image Steganography
The recent advances in generative image steganography have drawn increasing attention due to their potential for provable security and bulk embedding capacity.
Wenkang Su, J. Ni, Yiyang Sun
semanticscholar +1 more source
A combination of least significant bit and deflate compression for image steganography
Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where ...
H. Tayyeh, Ahmed Sabah Ahmed AL-Jumaili
semanticscholar +1 more source
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Moulin, Pierre, Wang, Ying
core +4 more sources

