Results 31 to 40 of about 435,902 (281)
Prognostic Value of a Stemness Index-Associated Signature in Primary Lower-Grade Glioma
ObjectiveAs a prevalent and infiltrative cancer type of the central nervous system, the prognosis of lower-grade glioma (LGG) in adults is highly heterogeneous.
Mingwei Zhang +10 more
doaj +1 more source
Context: Cancer Radiomics is an emerging field in medical imaging and refers to the process of converting routine radiological images that are typically qualitatively interpreted to quantifiable descriptions of the tumor phenotypes and when combined with
Devadhas Devakumar +11 more
doaj +1 more source
A threshold hybrid encryption method for integrity audit without trusted center
Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data.
Yange Chen +5 more
doaj +1 more source
Amyotrophic lateral sclerosis (ALS) is an incurable and rapidly progressive neurological disorder. Biomarkers are critical to understanding disease causation, monitoring disease progression and assessing the efficacy of treatments.
Maize C. Cao +8 more
doaj +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Enhancement of the Benjamin-Feir instability with dissipation [PDF]
It is shown that there is an overlooked mechanism whereby some kinds of dissipation can enhance the Benjamin-Feir instability of water waves. This observation is new, and although it is counterintuitive, it is due to the fact that the Benjamin-Feir ...
Craik A. D. D. +4 more
core +2 more sources
Industrial Internet of Things Threshold Signcryption Scheme Based on SM Algorithm [PDF]
The communication between the Supervisory Control And Data Acquisition (SCADA) system and terminal devices in the Industrial Internet of Things (IIoT) is vulnerable to tampering, eavesdropping, forgery, and other attacks.
LI Siqi, TIAN Youliang, PENG Changgen
doaj +1 more source
Data Confidentiality in Mobile Ad hoc Networks [PDF]
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali +3 more
core +2 more sources
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core

