Results 11 to 20 of about 18,037 (258)
Correlation of 3D MRI‐Derived Adenohypophysis Volume With Height and Peak GH in Peripubertal Children [PDF]
Purpose To investigate correlations between adenohypophysis volume (aPV) quantified by 3D CUBE T1 MRI, height, and peak GH levels (GH max), and evaluate its clinical utility.
Jianjian Cai +5 more
doaj +2 more sources
On some properties of antipodal partial cubes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Polat Norbert
openaire +3 more sources
On some characterizations of antipodal partial cubes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Polat Norbert
openaire +3 more sources
Construction of Multivariate Interpolation Hermite Polynomials for Finite Element Method [PDF]
A new algorithm for constructing multivariate interpolation Hermite polynomials in analytical form in a multidimensional hypercube is presented. These polynomials are determined from a specially constructed set of values of the polynomials themselves and
Chuluunbaatar Galmandakh +8 more
doaj +1 more source
Metamaterial array based meander line planar antenna for cube satellite communication
This research article presents a design and performance analysis of a metamaterial inspired ultra-high frequency (UHF) compact planar patch antenna for the CubeSat communication system that could be smoothly integrated with commercially available 2U Cube
Touhidul Alam +4 more
doaj +1 more source
Purpose: Oil Palm Boiler Clinker (OPBC) is a promising waste material that can be deployed toward sustainable development. Researchers have been looking into the potential of industrial waste and by-products to provide an alternative to natural stone ...
Muhammad Lutfi Othman +3 more
doaj +1 more source
Phase stability and coercivity in La2Fe14B magnet
Critical rare-earth free La2Fe14B (2:14:1) has the potential to be a gap permanent magnet. However, La2Fe14B decomposes into La, α-Fe, and LaFe4B4 phases below 1067 K.
X. B. Liu, I. C. Nlebedim
doaj +1 more source
Information hiding techniques are used to hide confidential data in digital carriers. It is difficult for malicious users to detect the existence of confidential data within the digital carriers.
Hung-Jui Ko +3 more
doaj +1 more source
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit +3 more
doaj +1 more source
A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography
Cryptography is the science and study of protecting data in computer and communication systems from unauthorized disclosure and modification. An ordinary difference equation (a map) can be used in encryption–decryption algorithms.
La Zakaria +2 more
doaj +1 more source

