X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
index medicus (6) 6
cloud computing (4) 4
field programmable gate arrays (4) 4
male (4) 4
computer science, information systems (3) 3
cryptography (3) 3
delays (3) 3
encryption (3) 3
engineering, electrical & electronic (3) 3
female (3) 3
humans (3) 3
mortality (3) 3
nano-scale finfet (3) 3
original (3) 3
privacy (3) 3
surgery (3) 3
table lookup (3) 3
threshold voltage (3) 3
abridged index medicus (2) 2
access control (2) 2
aged (2) 2
cloud (2) 2
clusters (2) 2
cohort studies (2) 2
collaboration (2) 2
delay (2) 2
digital (2) 2
dwpt (2) 2
encryption algorithm (2) 2
ethics (2) 2
fog (2) 2
fpga cluster (2) 2
further section (2) 2
gastrointestinal surgery (2) 2
health (2) 2
hospitals (2) 2
image encryption (2) 2
internet (2) 2
laparoscopy (2) 2
mathematical analysis (2) 2
middle aged (2) 2
optics (2) 2
original article (2) 2
patients (2) 2
prospective studies (2) 2
proxy re-encryption (2) 2
public key (2) 2
public key infrastructure (2) 2
scalability (2) 2
silicon (2) 2
steganography (2) 2
studies (2) 2
surgical outcomes (2) 2
technology scaling (2) 2
telecommunications (2) 2
threshold voltage variation (2) 2
trends (2) 2
3126 surgery, anesthesiology, intensive care, radiology (1) 1
abdomen (1) 1
abdominal surgery (1) 1
acid (1) 1
adding circuits (1) 1
adrenergic beta-antagonists - therapeutic use (1) 1
adult (1) 1
africa (1) 1
africa, northern - epidemiology (1) 1
age distribution (1) 1
angiotensin-converting enzyme inhibitors - therapeutic use (1) 1
animals (1) 1
anisotropy (1) 1
antibiotic resistance (1) 1
antibiotics (1) 1
antioxidant (1) 1
antioxidants (1) 1
antioxidants - pharmacology (1) 1
antioxidants - therapeutic use (1) 1
article (1) 1
atrial fibrillation - epidemiology (1) 1
attribute based encryption (1) 1
attribute-based encryption (1) 1
attribute‐based encryption (1) 1
austausch (1) 1
authorization (1) 1
barriers (1) 1
bayesian analysis (1) 1
beam propagation method (1) 1
beams (1) 1
biochemistry & molecular biology (1) 1
bioflavonoids (1) 1
bispectral index (1) 1
broad-band (1) 1
cancer-therapy (1) 1
cardiac & cardiovascular systems (1) 1
cardiomyopathies - epidemiology (1) 1
cardiovascular (1) 1
care-associated infection (1) 1
channel (1) 1
characterization and evaluation of materials (1) 1
checklist (1) 1
checklist - statistics & numerical data (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Circuits, Systems and Computers, ISSN 0218-1266, 2017, Volume 27, Issue 4
Journal Article
The Egyptian Rheumatologist, ISSN 1110-1164, 10/2017, Volume 39, Issue 4, pp. 207 - 211
To evaluate temporomandibular joint (TMJ) affection in rheumatoid arthritis (RA) patients by magnetic resonance imaging (MRI) versus musculoskeletal ultrasound... 
Temporomandibular joint | Musculoskeletal ultrasound | Magnetic resonance imaging | Rheumatoid arthritis | Usage | Medical examination | Ultrasonic waves | Diagnosis
Journal Article
Security and Communication Networks, ISSN 1939-0114, 12/2016, Volume 9, Issue 18, pp. 6248 - 6265
Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such... 
attribute‐based encryption | public key infrastructure | cloud computing | digital identity | proxy re‐encryption | attribute-based encryption | proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Data security | Cryptography | Information management | Access control | Privacy | Separation | Consumers | Data retrieval | Digital | Robustness
Journal Article
WIRELESS NETWORKS, ISSN 1022-0038, 02/2020, Volume 26, Issue 2, pp. 1389 - 1416
Journal Article
Journal of Hand and Microsurgery, ISSN 0974-3227, 04/2017, Volume 9, Issue 1, pp. 017 - 027
Abstract We study the influence of blood flow on the neuroma formation after transposition of the nerve stump into a vein. A total of 30 rats were divided into... 
Original Article | management of neuroma | transposition of the nerve stump into vein on neuroma | Original | influence of blood flow on the neuroma formation
Journal Article
Egyptian Liver Journal, 02/2020, Volume 10, Issue 1, pp. 1 - 8
Abstract Background Nonalcoholic fatty liver disease (NAFLD) is a possible risk factor for chronic kidney disease (CKD). Renal resistive index (RRI) which is a... 
RRI | NAFLD | NASH | CKD
Journal Article
International Journal of Computer Science Issues (IJCSI), ISSN 1694-0814, 09/2016, Volume 13, Issue 5, pp. 108 - 108
  Visual tracking is considered to be one of the most important challenges in computer vision with numerous applications such as object recognition and... 
Datasets | Methods | Optical tracking | Error analysis | Tracking | Mathematical analysis | Color | Tracking (position) | Frames per second | Object recognition
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 09/2019
Journal Article
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, ISSN 0740-3224, 03/2019, Volume 36, Issue 3, pp. 652 - 661
Ultracompact transverse electric (TE)- and transverse magnetic (TM)-pass polarizers based on a hybrid plasmonic silicon-on-insulator platform are reported and... 
ULTRA-COMPACT TE | WAVE-GUIDE | OPTICS | MODULATION | SILICON | BROAD-BAND
Journal Article
Contraception, ISSN 0010-7824, 03/2020, Volume 101, Issue 3, pp. 162 - 166
To determine the effectiveness of 3 mg vaginal dinoprostone administered six hours prior to copper intrauterine device (IUD) insertion compared to placebo in... 
Dinoprostone | Nullipara | Pain | Intrauterine device | IUD INSERTION | HYSTEROSCOPY | SAFETY | MISOPROSTOL | OBSTETRICS & GYNECOLOGY
Journal Article
2013 International Conference on Cloud Computing and Big Data, 12/2013, pp. 15 - 22
This paper presents a generic, scalable and fine-grained data access system that realizes the main challenges which hinder the growth of using... 
Access control | Cloud computing | Scalability | System performance | Public key | Proxy Re-encryption | Attribute Based Encryption | Public Key Infrastructure | Encryption | Cloud Computing | Construction | Data management | Infrastructure | Unauthorized | Digital | Passports
Conference Proceeding
Journal of Information Security and Applications, ISSN 2214-2126, 04/2020, Volume 51, p. 102412
Recently, digital communication and storage over the Internet through the cloud have increased in a rapid manner. Accordingly, data security becomes a vital... 
Steganography | Cryptography | DWPT | Cloud | Fog | ENCRYPTION ALGORITHM | INTERNET | PRIVACY | COMPUTER SCIENCE, INFORMATION SYSTEMS | IMAGE ENCRYPTION
Journal Article
Security and Communication Networks, ISSN 1939-0114, 12/2016, Volume 9, Issue 18, pp. 6248 - 6265
Journal Article
by Alexander, Philip and Borda-Luque, Giuliano and Ingabire, JC Allen and Ismaïl, Lawani and Kojo, Anyomih Theophilus Teddy and Lilford, Richard and Morton, Dion and Adisa, Adewale O and Pinkney, Thomas and Smart, Neil and Kirby, Andrew and Søreide, Kjetil and Cornick, Jen and King, Sebastian and Firdouse, Mohammed and Rouse, Tyler and Zilinskas, Justas and Farrugia, Alexia and Gala, Tanzeela and Bratu, Matei and Ortega, Irene and Narayanan, Ragavan and Klappenbach, Roberto and Costa, Cecilia and Hamill, Daniel and Deutschmann, Peter and Nataraja, Ram and Sharpin, Claire and Ljuhar, Damir and Gray, Demi and Niranjan, Nithya and Aman, Nowrin F and Razzaque, Joyeta and Jonnalagadda, Ramesh and Filatau, Aliaksandr and Shachykava, Tatsiana and Noukpozounkou, Bruno and Imorou Souaibou, Yacoubou and Keke, Kpèmahouton René and Ahounou, Ernest Yemalin Stephane and Ahlonsou, Germain and Barendegere, Venerand and Choi, Philip and Jamal, Luai and Azzie, Georges and Yip, Chingwan and Sierra, Sebastian and Mendoza Arango, Maria Clara and Karlo, Robert and Youssef, Mohamed and Elfeki, Hossam and Mostafa, Mohamed and Omar, Muhammad Fathi Waleed and Ghanem, Ahmed and Emara, Eman and Rashad, Eman and Khafagy, Toqa and Ibrahim, Eman and Morsy Farahat, Mahitab and Gamal, Esraa and Gamal, Heba and Kandil, Hend and Gamal, Dina and Salah, Asmaa and Mohamed, Mazed and Assal, Abdelrahman and Sleem, Mohamed and Adam, Nourhan and Mowafy, Bassant and Allam, Meran and Halim El Gendy, Noran and Shalaby, Mahmoud and Adel Elsharkawy, Aya and Omar, Mohammad Elsayed and Arafa, Omar and Salem, Menatalla and Elsabbagh, Nourhan and Abdelhady, Samar and Soliman, Nourhan and Ezzat, Eslam and Mohammed, Sara and Reda, Aya and Abdalmageed Kasem, Esraa and Mohammed, Ahmed Rabeih and Hassaan, Amr and Magdy, Mohamed and Ahmed, Hussien and Abdelbadeai, Kholoud and Abozed Abdullah, Mohamed and Adelshone, Abdelrahman and Bin Hasnan, Muhammad and Shaharuddin, Shahadatul and Amreia, Mahmoud and Salma, Mahmoud and Ata, Aya Yehia and Rezq, Asmaa and Sheta, Ahmed and Darwish, Abdelrhman KZ and Zohair, Ahmed and Moussa, Omar and ... and GlobalSurg Collaborative
The Lancet Infectious Diseases, ISSN 1473-3099, 05/2018, Volume 18, Issue 5, pp. 516 - 525
Journal Article
International Design and Test Workshop, ISSN 2162-0601, 02/2017, pp. 37 - 42
Conference Proceeding
2015 IEEE 13th International New Circuits and Systems Conference (NEWCAS), 06/2015, pp. 1 - 4
The performance of FinFET-based FPGA cluster is evaluated with technology scaling for channel length from 20nm down to 7nm showing the scaling trends of basic... 
Performance evaluation | FPGA cluster | Technology scaling | Nano-scale FinFET | FinFETs | Threshold voltage | Delays | Table lookup | threshold voltage variations | Field programmable gate arrays | Electric power generation | Conferences | Simulation | Clusters | Trends | Delay
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.