Results 21 to 30 of about 435,902 (281)
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks ...
Ismail Butun, Patrik Osterberg
doaj +1 more source
Concordia: A Streamlined Consensus Protocol for Blockchain Networks
In this paper, we present a novel Byzantine fault-tolerant consensus protocol for sharded blockchain networks that does not rely on expensive leader-driven communication.
Carlos Santiago +3 more
doaj +1 more source
Association of Human iPSC Gene Signatures and X Chromosome Dosage with Two Distinct Cardiac Differentiation Trajectories. [PDF]
Despite the importance of understanding how variability across induced pluripotent stem cell (iPSC) lines due to non-genetic factors (clone and passage) influences their differentiation outcome, large-scale studies capable of addressing this question ...
Banovich +34 more
core +2 more sources
Analysis of unusual and signature APOBEC-mutations in HIV-1 pol next-generation sequences.
IntroductionAt low mutation-detection thresholds, next generation sequencing (NGS) for HIV-1 genotypic resistance testing is susceptible to artifactual detection of mutations arising from PCR error and APOBEC-mediated G-to-A hypermutation.MethodsWe ...
Philip L Tzou +5 more
doaj +1 more source
Breast cancer is currently the most prevalent form of cancer worldwide. Nevertheless, there remains limited clarity regarding our understanding of the tumor microenvironment and metabolic characteristics associated with it.
Yuan Yuan +5 more
doaj +1 more source
A robustness verification system for mobile phone authentication based on gestures using Linear Discriminant Analysis [PDF]
This article evaluates an authentication technique for mobiles based on gestures. Users create a remindful identifying gesture to be considered as their in-air signature. This work analyzes a database of 120 gestures of different vulnerability, obtaining
Bailador del Pozo, Gonzalo +3 more
core +2 more sources
Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature
Blockchain technology has gained its attention from its application in bitcoin which circumvented the problem of double spending that existed in the prior digital currencies, through validation.
Dharani J +3 more
doaj +1 more source
IntroductionInherited or acquired molecular abnormalities form a clinically heterogeneous group of fibrinogen disorders called dysfibrinogenaemia.
Rosa Toenges +4 more
doaj +1 more source
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing [PDF]
To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting functional requirements of transport operators.
Arfaoui, Ghada +5 more
core +6 more sources
Survival prediction in mesothelioma using a scalable lasso regression model: instructions for use and initial performance using clinical predictors [PDF]
Introduction: Accurate prognostication is difficult in malignant pleural mesothelioma (MPM). We developed a set of robust computational models to quantify the prognostic value of routinely available clinical data, which form the basis of published MPM ...
Blyth, Kevin G. +5 more
core +1 more source

