Results 51 to 60 of about 167,764 (227)
Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi +2 more
doaj +1 more source
Background Using hydroxychloroquine (HCQ) dose of 5 mg/kg/day in systemic lupus erythematosus (SLE) is associated with a higher risk of flares; HCQ blood level monitoring could be a better way to adjust HCQ dose. We studied the upper threshold for a reference range of HCQ levels to inform routine monitoring.
Shivani Garg +42 more
wiley +1 more source
IS COMMON CAROTID INTIMA MEDIA THICKNESS AN INDEPENDENT PREDICTOR FOR CORONARY ARTERY DISEASE
Introduction: Non-invasive measurement of carotid intima media thickness (IMT) has been noted as a marker for atherosclerosis and can serve as a predictor of cardiovascular accidents.
Masoume Sadeghi +4 more
doaj
Myeloid-derived suppressor cells (MDSCs) have been demonstrated to suppress antitumor immunity and induce resistance to PD-1/PD-L1 blockade immunotherapy in gastric and colon cancer patients.
Yao Tang +8 more
doaj +1 more source
Objective Bone destruction associated with active rheumatoid arthritis (RA) remains a major therapeutic challenge, with a lack of reliable molecular markers reflecting bone injury. This study aims to identify novel biomarkers linked to bone destruction in active RA through proteomic analysis, providing new strategies for precise monitoring and targeted
Pengfei Xin +15 more
wiley +1 more source
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a
Nithya Chidambaram +3 more
doaj +1 more source
Selection of EAP-authentication methods in WLANs [PDF]
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core
Objective High intensity conditioning autologous hematopoietic stem cell transplantation (AHSCT) is standard of care for patients with advanced SSc. The role of reduced intensity conditioning (RIC) prior to AHSCT in this population remains unclear. We conducted this study to determine the long‐term outcomes of RIC AHSCT in SSc patients with cardiac ...
Yonatan Lean +4 more
wiley +1 more source
Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode
Maulyanda Az +2 more
doaj +1 more source
Message authentication codes for the Network Time Protocol [PDF]
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication,
Goldberg, Sharon, Malhotra, Aanchal
core

