Search results for "Crypt"

showing 10 items of 1111 documents

Hybrid descriptive-inferential method for key feature selection in prostate cancer radiomics

2021

In healthcare industry 4.0, a big role is played by radiomics. Radiomics concerns the extraction and analysis of quantitative information not visible to the naked eye, even by expert operators, from biomedical images. Radiomics involves the management of digital images as data matrices, with the aim of extracting a number of morphological and predictive variables, named features, using automatic or semi-automatic methods. Multidisciplinary methods as machine learning and deep learning are fully involved in this field. However, the large number of features requires efficient and effective core methods for their selection, in order to avoid bias or misinterpretations problems. In this work, t…

business.industryComputer sciencefeature selection image analysis prostate cancer radiomicsFeature selectionManagement Science and Operations Researchmedicine.diseaseMachine learningcomputer.software_genreprostate cancerGeneral Business Management and AccountingProstate cancerRadiomicsimage analysisradiomicsModeling and SimulationFeature selectionmedicineKey (cryptography)Artificial intelligencebusinesscomputer
researchProduct

The pathophysiology of acute heart failure: the key role of fluid accumulation

2008

business.industryHeart failureKey (cryptography)MedicineFluid accumulationCardiology and Cardiovascular MedicinebusinessBioinformaticsmedicine.diseasePathophysiology
researchProduct

Number transcoding in children: A functional analysis

1994

French-speaking second-grade children from France and Wallonia were asked to write down in the Arabic code, numbers orally presented at six successive one-month-spaced sessions. The evolution of the children's production (patterns of correct responses and errors) is analysed and tentatively interpreted through the model of number and calculation processing developed by McCloskey in adult neuropsychology. In order to evaluate their number production and comprehension mechanisms the children were furthermore submitted to other number processing tasks. It is tentatively concluded that the children's difficulties in the Arabic written task were localized at the level of the production of the Ar…

business.industryInformation processingNeuropsychologyCognitioncomputer.software_genreDevelopmental psychologyTask (project management)ComprehensionDevelopmental NeuroscienceDevelopmental and Educational PsychologyCode (cryptography)Cognitive developmentProduction (computer science)Artificial intelligencebusinessPsychologycomputerNatural language processingBritish Journal of Developmental Psychology
researchProduct

Key Drivers of Internet Banking Adoption

2008

The objective of this chapter is to provide students and managers with a holistic view into the different factors that influence online banking adoption and to use the study’s findings to develop strategies for managers on how to maximize the rate of Internet banking adoption. Research done with a sample size of 450 Spanish Internet users, has highlighted that Internet banking adoption is more likely in young, highly educated and high-income consumers. Internet affinity, online use experience and some perceived benefits are also key drivers of online financial services pur chase decision-making. Perceived financial, social and psychological risk negatively influences the use of online-banki…

business.industryInternet privacyKey (cryptography)The InternetBusinessInternet usersMarketingSociology of the Internet
researchProduct

Knock out der c-Jun N-terminalen Kinase 2 (JNK2) aggraviert die Entwicklung der chronischen DSS-Colitis unabhängig von der intestinalen Zytokin-Expre…

2008

Background The c-Jun N-terminal kinase 2 (JNK2) is involved in signal transduction of inflammatory bowel diseases (IBD) and regulates the expression of pro-inflammatory cytokines. For this reason, JNK2 is considered as novel target for IBD therapy. The aim of this study was 1.) to examine the function of JNK2 applying a low dose Dextran Sulfate Sodium (DSS) model of chronic experimental colitis in JNK2 knock out mice and 2.) to analyze the expression of JNK2 dependent cytokines. Material and Methods: For induction of a mild chronic colitis, female JNK2 knockout mice (JNK2 ko) and their wildtype controls (WT2) received three cycles of DSS treatment, each consisting of 1.0 % DSS for 5 days, f…

business.industryKinaseCryptWild typeInflammationmedicine.diseaseAndrologyImmune systemddc: 610Knockout mousemedicineTumor necrosis factor alphamedicine.symptomColitisbusiness
researchProduct

Citizen’s Rights in European Environmental Law: Stock-Taking of Key Challenges and Current Developments in Relation to Public Access to Information, …

2012

The article aims to provide a short overview of the current situation regarding public access to information, participation and access to justice in Europe. The article briefly presents the role of the Aarhus Convention and its compliance mechanism in shaping the respective legal framework at both national level and EU level. On that basis it summarises some key challenges and implementation problems respectively in relation to public access to information, participation and access to justice.

business.industryManagement Monitoring Policy and LawInternational lawPublic relationsPublic administrationStock-takingAarhus ConventionCompliance (psychology)Environmental lawPolitical sciencePublic participationKey (cryptography)Justice (ethics)businessLawJournal for European Environmental & Planning Law
researchProduct

Development of the optical multiplexer board prototype for data acquisition in TileCal experiment

2005

The optical multiplexer board is one of the elements present in the read out chain of the tile calorimeter in ATLAS experiment. Due to radiation effects, two optical fibers with the same data come out from the front end boards to this board, which has to decide in real time which one carries good data and pass them to the read out driver motherboard for processing. This paper describes the design and tests of the first prototype, implemented as a 6U VME64x slave module, including both hardware and firmware aspects. In this last, algorithms for cyclic redundancy code checking are used to make the decision. Besides, the board may be used as a data injector for testing purposes of the read out…

business.industryMotherboardFirmwareComputer scienceATLAS experimentcomputer.software_genreMultiplexerFront and back endsData acquisitionEmbedded systemCyclic redundancy checkCode (cryptography)businesscomputerComputer hardware14th IEEE-NPSS Real Time Conference, 2005.
researchProduct

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

Physically-consistent parameterization in the modeling of solar photovoltaic devices

2011

This research tests the standard one-diode model of a crystalline-Si photovoltaic cell, focusing on the physical accuracy. In particular, the (apparent) shunt resistance and the diode ideality factor are studied. Current-voltage characteristics of illuminated crystalline-Si photovoltaic modules are analyzed, and some limits of applicability of the standard model are given. Typical values of the ideality factor for crystalline-Si devices are derived from own experimental data as well as from recently published literature. It is shown that the contribution of the apparent shunt resistance is only significant for cell voltages below about 0.45 V, and depends on irradiance. This result is consi…

business.industryPhotovoltaicsComputer sciencePower electronicsPhotovoltaic systemSemiconductor device modelingElectrical engineeringElectronic engineeringIrradiancebusinessDiodeStandard model (cryptography)Voltage2011 IEEE Trondheim PowerTech
researchProduct

Key drivers of internet banking services use

2009

PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…

business.industryProduct involvementUsabilitySample (statistics)Library and Information SciencesComputer securitycomputer.software_genreStructural equation modelingComputer Science ApplicationsRisk perceptionFormative assessmentKey (cryptography)The InternetMarketingbusinesscomputerInformation SystemsOnline Information Review
researchProduct