Results 21 to 30 of about 32,805 (155)

Three-dimensional meniscus allograft sizing—a study of 280 healthy menisci

open access: yesJournal of Orthopaedic Surgery and Research, 2020
Background Inaccurate meniscus allograft size is still an important problem of the currently used sizing methods. The purpose of this study was to evaluate a new three-dimensional (3D) meniscus-sizing method to increase the accuracy of the selected ...
Silvan Beeler   +6 more
doaj   +1 more source

Quantitative light-induced fluorescence (QLF) in relation to other technologies and conventional methods for detecting occlusal caries in permanent teeth

open access: yesBrazilian Journal of Oral Sciences, 2015
Aim: The aim of this in vitro study was to compare the reproducibility and accuracy of quantitative light-induced fluorescence (QLF) in relation to other technologies and conventional methods for detecting occlusal carious lesions.
Antônio Carlos Pereira   +5 more
doaj   +1 more source

Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers [PDF]

open access: yes, 2023
In this paper, we propose a rectangle-like method called \textit{rotational-XOR differential rectangle} attack to search for better distinguishers. It is a combination of the rotational-XOR cryptanalysis and differential cryptanalysis in the rectangle ...
Mingming Zhu   +5 more
core  

Influence of the ACTN3 R577X genotype on the injury epidemiology of marathon runners.

open access: yesPLoS ONE, 2020
A common single nucleotide polymorphism in the ACTN3 gene might result in the complete deficiency of α-actinin-3 (i.e., XX genotype). It has been found that ACTN3 XX individuals have several traits related to lessened muscle performance. This study aimed
Victor Moreno   +4 more
doaj   +1 more source

Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette [PDF]

open access: yes, 2021
The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994.
Chao Li, Siwei Sun, Yunwen Liu
core  

Setup error and residual error analysis of ExacTrac X-ray image guidance system in stereotactic radiotherapy for brain metastases

open access: yesJournal of Radiation Research and Applied Sciences, 2022
Objective: This study aims to analyze the setup errors of the ExacTrac X-ray image guidance system in stereoscopic radiotherapy for brain metastases and discuss the necessity of setup error verification after bed angle movement.
Wei Hua   +4 more
doaj   +1 more source

Self Capacitance Mismatch Calibration Technique for Fully-Differential Touch Screen Panel Self Capacitance Sensing System

open access: yesSensors, 2023
This paper presents a fully-differential touch screen panel (TSP) self-capacitance sensing (SCS) system with a self-capacitance mismatch calibration technique.
Siheon Seong   +3 more
doaj   +1 more source

Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA) [PDF]

open access: yes, 2022
Automated search methods based on Satisfiability Modulo Theories (SMT) problems are being widely used to evaluate the security of block ciphers against distinguishing attacks.
Adrián Ranea, Vincent Rijmen
core  

A Novel 1-Bit Reconfigurable Transmitarray Antenna Using a C-Shaped Probe-Fed Patch Element With Broadened Bandwidth and Enhanced Efficiency

open access: yesIEEE Access, 2020
A 16 ×16 -element reconfigurable transmitarray antenna (RTA) is designed and experimented in this paper. The proposed element consists of a receiving (Rx) structure and a transmitting (Tx) structure.
Min Wang   +5 more
doaj   +1 more source

Functional Cryptanalysis: Application to reduced-round Xoodoo [PDF]

open access: yes, 2022
This paper proposes functional cryptanalysis, a flexible and versatile approach to analyse symmetric-key primitives with two primary features. Firstly, it is a generalization of multiple attacks including (but not limited to) differential, rotational and
Emanuele Bellini, Rusydi H. Makarim
core  

Home - About - Disclaimer - Privacy