Results 51 to 60 of about 60,860 (288)
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah +8 more
wiley +1 more source
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim +11 more
wiley +1 more source
Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios
The quantum communication channel is considered to be eavesdropped when the signal Quantum Bit Error Rate (QBER) exceeds a defined theoretical limit and is thus considered a figure of merit parameter for assessing the security of a quantum channel.
Abhishek Khanna +3 more
doaj +1 more source
Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code [PDF]
Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such
Patra, Nilkesh, Sankar, Sila Siba
core
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
Improving the security of LSB image steganography
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh +3 more
doaj +1 more source
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park +4 more
doaj +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja +4 more
wiley +1 more source
High‐performance nickel‐based superalloys are often not processible in additive manufacturing (AM) due to hot cracking. The findings in this manuscript propose an efficient method to mitigate cracking and enhance mechanical properties of these alloys by producing a metal matrix composite, contributing to the material and process perspective of the AM ...
Klaus Büßenschütt +3 more
wiley +1 more source

