Results 41 to 50 of about 1,214,320 (245)

Multi-Scale Modelling of the Bound Metal Deposition Manufacturing of Ti6Al4V

open access: yesThermo, 2022
Nonlinear shrinkage of the metal part during manufacturing by bound metal deposition, both on the ground and under microgravity, is considered. A multi-scale physics-based approach is developed to address the problem.
Dmitry G. Luchinsky   +7 more
doaj   +1 more source

Scope-bounded multistack pushdown systems: fixed-point, sequentialization, and tree-width [PDF]

open access: yes, 2012
We present a novel fixed-point algorithm to solve reachability of multi-stack pushdown systems restricted to runs of bounded-scope. The followed approach is compositional, in the sense that the runs of the system are summarized by bounded-size interfaces.
Gennaro, Parlato, La Torre, Salvatore
core   +3 more sources

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

Evaluation of the Utility of Baseline Echocardiogram in Patients With Standard Risk Precursor B‐Lymphoblastic Leukemia

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background A routine baseline echocardiogram is often obtained prior to anthracycline administration in children with cancer. The utility of baseline echocardiogram is unclear in patients with standard risk B‐cell acute lymphoblastic leukemia (SR B‐ALL) as their anthracycline cumulative dose is low.
Ziyad Alrajhi   +4 more
wiley   +1 more source

Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency

open access: yesIEEE Access
With the development of the Internet of Things (IoT) and communication technologies, multimedia information has become an essential part of communication.
Yunlong Liao   +4 more
doaj   +1 more source

Upacicalcet: A Novel Intravenous Calcimimetic Agent for Patients Undergoing Hemodialysis With Secondary Hyperparathyroidism

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Secondary hyperparathyroidism (SHPT) is a common complication in patients receiving maintenance dialysis, driven by calcium and phosphate metabolism disturbances. Calcimimetics are central to the management of SHPT by enhancing calcium‐sensing receptor sensitivity and reducing parathyroid hormone secretion.
Fumihiko Koiwa   +3 more
wiley   +1 more source

Differential-Linear Cryptanalysis and Cube Attacks on ChiLow

open access: yesIACR Transactions on Symmetric Cryptology
ChiLow is a family of tweakable block ciphers specifically designed for embedded code encryption, proposed at EUROCRYPT 2025. Its novel nested tweakkey schedule and a variant of the χ function significantly enhance latency and energy efficiency.
Cheng Che, Tian Tian
doaj   +1 more source

Side-Channel Attack on a Protected RFID Card

open access: yesIEEE Access, 2018
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy