Results 41 to 50 of about 5,924 (276)
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users.
Xuyang Ding +4 more
doaj +1 more source
Principle of Steganography Tool BCS (Bilevel Compression by Using Steganography)
In this paper we make a new approach of compression used as a tool of steganography instead of make it as obstacle (BCS). The outline of BCS compression used two steps level 1 and level 2, level 1 is a new approach of compress images which depends on the fact that every paint has a limited colors, that make it reduce the physical size of repeating ...
openaire +2 more sources
Forensic steganalysis for identification of steganography software tools using multiple format image
<p>Today many steganographic software tools are freely available on the Internet, which helps even callow users to have covert communication through digital images. Targeted structural image steganalysers identify only a particular steganographic software tool by tracing the unique fingerprint left in the stego images by the steganographic ...
S. T. Veena, A. Selvaraj
openaire +2 more sources
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro +10 more
wiley +1 more source
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson +20 more
wiley +1 more source
Steganography based on parameters’ disturbance of spatial image transform
In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in ...
Xi SUN +3 more
doaj +2 more sources
A Privacy-Preserving Method Based on Artificial Immune Computing in MCS
Due to the widespread use of mobile intelligent terminal devices, Mobile Crowd Sensing (MCS) applications have gained significant research attention. However, ensuring users privacy remains a critical challenge, as it can hinder users’ willingness
Hao Long +4 more
doaj +1 more source
DNA Steganalysis Using Deep Recurrent Neural Networks
Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography.
Bae, Ho +3 more
core +1 more source
Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig +13 more
wiley +1 more source

