Results 41 to 50 of about 21,521,866 (302)
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh+2 more
doaj +1 more source
An short‐mid‐long term prediction model has been designed to understand the early dynamics of the COVID‐19 epidemic in the southeast Asian region. Based on the proposed prediction model we estimated the epidemic trend of COVID‐19 outbreak in SAARC countries for 20 days (short term), 90 days (mid‐term), and 180 days (long term), respectively.
Samrat Kumar Dey+4 more
wiley +1 more source
Brain cortical complexity, measured through fractal dimension analysis, decreases with increasing age and parietal lobe is the most age affected lobe in both sexes across adulthood (age range 45–79 years). Males, having significantly higher cortical complexity than females, showed greater complexity decline in right hemisphere.
Nafeesa Nazlee+2 more
wiley +1 more source
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka+14 more
doaj +1 more source
Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj +1 more source
Analysis of the new standard hash function [PDF]
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy.
arxiv
An Investigation of Precise Orbit and Clock Products for BDS-3 from Different Analysis Centers
A quality evaluation of precise products for BDS-3 constellations is presented for the first time in this contribution. Then, the tropospheric delay retrieval and positioning performance of BDS-3 precise point positioning (PPP) solutions using the ...
Pengli Shen+4 more
doaj +1 more source
Role of circulating exosomal biomarkers and their diagnostic accuracy in pancreatic cancer
This systematic review aims to evaluate the current literature involving pancreatic cancer patient groups in search of highly accurate exosomal biomarkers. We reviewed 9 studies which involved 565 participants (331 PC and 234 controls). The mRNA panel (ARG1, CD63, CK18, Erbb3, GAPDH, H3F3A, KRAS, and ODC1) and GPC1 reported the highest performing ...
Menazir Sha+5 more
wiley +1 more source
Custom ASIC Design for SHA-256 Using Open-Source Tools
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck+4 more
doaj +1 more source
Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso+62 more
core +2 more sources