Results 31 to 40 of about 689 (221)

Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms

open access: yesFrontiers in Neurology, 2023
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang   +11 more
doaj   +1 more source

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice

open access: yesBMC Complementary Medicine and Therapies, 2021
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan   +8 more
doaj   +1 more source

The Brauer-Manin Obstruction and III[2] [PDF]

open access: yesLMS Journal of Computation and Mathematics, 2007
We discuss the Brauer-Manin obstruction on del Pezzo surfaces of degree 4. We outline a detailed algorithm for computing the obstruction and provide associated programs in MAGMA. This is illustrated with the computation of an example with an irreducible cubic factor in the singular locus of the defining pencil of quadrics (in contrast to previous ...
Bright, MJ, Bruin, N, Flynn, V, Logan, A
openaire   +3 more sources

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2018
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh   +2 more
doaj   +1 more source

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Reference intervals of serum hyaluronic acid corresponding to the radiographic severity of knee osteoarthritis in women

open access: yesBMC Musculoskeletal Disorders, 2013
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka   +14 more
doaj   +1 more source

Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption

open access: yesCurrent Directions in Biomedical Engineering, 2021
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj   +1 more source

Custom ASIC Design for SHA-256 Using Open-Source Tools

open access: yesComputers, 2023
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy