Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2020 at "Current Urology Reports"
DOI: 10.1007/s11934-019-0950-0
Abstract: Purpose of Review A review of the impact of several key patient characteristics on oncologic outcomes in bladder cancer (BC) summarized and analyzed in a narrative fashion. Recent Findings The bulk of the published literature…
read more here.
Keywords:
bladder cancer;
based key;
outcomes based;
disparities bladder ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3188798
Abstract: Quantum Cryptography emerged from the limitations of classical cryptography. It will play a vital role in information security after the availability of expected powerful quantum computers. Still many quantum primitives like quantum money, blind quantum…
read more here.
Keywords:
sifting scheme;
reconciliation;
quantum;
based key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3399007
Abstract: Estimation of key indicators in rivers was usually conducted with use of monitoring data of Internet of Things. Currently, it has been a more practical demand to extract key indexes in rivers from the perspective…
read more here.
Keywords:
deep learning;
key indicators;
remote;
remote sensing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2018.2808527
Abstract: Ring Learning With Errors (RLWE)-based key exchange is one of the most efficient and secure primitive for post-quantum cryptography. One common approach to achieve key exchange over RLWE is error reconciliation. Recently, an efficient attack…
read more here.
Keywords:
attack;
based key;
rlwe based;
key exchange ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Cybernetics"
DOI: 10.1109/tcyb.2019.2963138
Abstract: In this article, we propose a key secret-sharing technology based on generative adversarial networks (GANs) to address three major problems in the blockchain: 1) low security; 2) hard recovery of lost keys; and 3) low…
read more here.
Keywords:
scheme;
secret sharing;
based key;
gan based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Wireless Communications"
DOI: 10.1109/twc.2025.3548670
Abstract: To protect underwater acoustic communications from interception, the exchange of encryption keys is necessary. Since underwater devices can be compromised, generating keys on site is a better option than predefined keys. In this paper, we…
read more here.
Keywords:
underwater acoustic;
channel based;
alice bob;
acoustic communications ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "BMC Medical Education"
DOI: 10.1186/s12909-024-06487-8
Abstract: Innovative assessment strategies are essential for determining clinical understanding in the evolving field of health profession education. Key feature questions (KFQs) have been developed as assessment tools to assess the clinical understanding of students. The…
read more here.
Keywords:
key feature;
image based;
based key;
feature questions ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Bioengineering"
DOI: 10.3390/bioengineering12101093
Abstract: Large-scale medical visual question answering (MedVQA) datasets are critical for training and deploying vision–language models (VLMs) in radiology. Ideally, such datasets should be automatically constructed from routine radiology reports and their corresponding images. However, no…
read more here.
Keywords:
clip based;
lesion;
language;
based key ... See more keywords