Results 51 to 60 of about 4,573,671 (268)
Key Questions for Next-Generation Biomonitoring [PDF]
Classical biomonitoring techniques have focused primarily on measures linked to various biodiversity metrics and indicator species. Next-generation biomonitoring (NGB) describes a suite of tools and approaches that allow the examination of a broader spectrum of organizational levels—from genes to entire ecosystems.
Andreas Makiola +54 more
openaire +7 more sources
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
Generation of key in cryptographic system for secure communications [PDF]
Report discusses key generation for transmission of confidential data.
Perlman, M.
core +1 more source
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable
Hayashi, Masahito, Nakayama, Ryota
core +1 more source
Recommendation for cryptographic key generation [PDF]
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic ...
Elaine Barker, Allen Roginsky
openaire +1 more source
Abstract Introduction The TEDDI trial tested the feasibility and reproducibility of deep‐inspiration breath‐hold (DIBH) in pediatric patients referred for radiotherapy. This report presents final results, including patient‐reported outcomes (PRO) and dosimetric comparison of DIBH and free‐breathing (FB).
Daniella Elisabet Østergaard +11 more
wiley +1 more source
H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors
We present Heartbeats-2-Bits (H2B), which is a system for securely pairing wearable devices by generating a shared secret key from the skin vibrations caused by heartbeat. This work is motivated by potential power saving opportunity arising from the fact
Hassan, Mahbub +6 more
core +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
In the context of dual carbon, in order to realize the low-carbon economic operation of the integrated energy system, an optimal dispatching model of integrated energy system considering generalized electric heating demand response and stepped carbon ...
TIAN Yukun +5 more
doaj +1 more source
IRS-Assisted Hybrid Secret Key Generation
Physical layer secret key (SK) generation is known to be an efficient means to achieve a high secrecy rate, on the condition that dynamic channel state information (CSI) is provided. For this reason, the secrecy performance is highly degraded in a static environment.
Meixiang Zhang +2 more
openaire +1 more source

