Results 31 to 40 of about 435,902 (281)

Prognostic Value of a Stemness Index-Associated Signature in Primary Lower-Grade Glioma

open access: yesFrontiers in Genetics, 2020
ObjectiveAs a prevalent and infiltrative cancer type of the central nervous system, the prognosis of lower-grade glioma (LGG) in adults is highly heterogeneous.
Mingwei Zhang   +10 more
doaj   +1 more source

Framework for machine learning of ct and pet radiomics to predict local failure after radiotherapy in locally advanced head and neck cancers

open access: yesJournal of Medical Physics, 2021
Context: Cancer Radiomics is an emerging field in medical imaging and refers to the process of converting routine radiological images that are typically qualitatively interpreted to quantifiable descriptions of the tumor phenotypes and when combined with
Devadhas Devakumar   +11 more
doaj   +1 more source

A threshold hybrid encryption method for integrity audit without trusted center

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2021
Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data.
Yange Chen   +5 more
doaj   +1 more source

Serum biomarkers of neuroinflammation and blood-brain barrier leakage in amyotrophic lateral sclerosis

open access: yesBMC Neurology, 2022
Amyotrophic lateral sclerosis (ALS) is an incurable and rapidly progressive neurological disorder. Biomarkers are critical to understanding disease causation, monitoring disease progression and assessing the efficacy of treatments.
Maize C. Cao   +8 more
doaj   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Enhancement of the Benjamin-Feir instability with dissipation [PDF]

open access: yes, 2007
It is shown that there is an overlooked mechanism whereby some kinds of dissipation can enhance the Benjamin-Feir instability of water waves. This observation is new, and although it is counterintuitive, it is due to the fact that the Benjamin-Feir ...
Craik A. D. D.   +4 more
core   +2 more sources

Industrial Internet of Things Threshold Signcryption Scheme Based on SM Algorithm [PDF]

open access: yesJisuanji gongcheng
The communication between the Supervisory Control And Data Acquisition (SCADA) system and terminal devices in the Industrial Internet of Things (IIoT) is vulnerable to tampering, eavesdropping, forgery, and other attacks.
LI Siqi, TIAN Youliang, PENG Changgen
doaj   +1 more source

Data Confidentiality in Mobile Ad hoc Networks [PDF]

open access: yes, 2012
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali   +3 more
core   +2 more sources

Feasibility and Preliminary Efficacy of Integrative Neuromuscular Training for Childhood Cancer Survivors: A Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian   +7 more
wiley   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Home - About - Disclaimer - Privacy