ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Literature
Languages
Education
Social Sciences
Architecture and Urbanism
Research
History
Medicine / Cardiology
Communication
Music
all records (57)

Languages
English
Spanish
French
Portuguese

Countries
Indonesia
Brazil
USA
Spain
Ukraine
Poland
Australia
Italy
South Africa
Slovenia
all records (45)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
519  Articles
1 of 53 pages  |  10  records  |  more records»
Objective: To determine the safety and outcome of splenic artery(SA) transposition in extra-anatomic hepatic arterial reconstruction (HAR) in living donor liver transplantation(LDLT).Methods: We retrospectively compared the outcome of the ten liver recipi... see more

Data security is a very important thing to do so that messages or information are sent to someone who is not known by unauthorized persons. Data security techniques that The ones that are often used today are cryptography and steganography. In t... see more

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly use... see more

Background: Arterial switch operation (ASO) is the treatment of choice for D-transposition of great arteries (D-TGA). The purpose of the study was to evaluate the long-term outcome after ASO. Methods: We either retrospectively reviewed the documentation o... see more

The development of communication technology such as the use of mobile phones based on android. Android has the capability of getting good as personal computer and it has a large storage area. Android users use it to store important data. Critical data tha... see more

The purpose of this research to describe the transposition and modulation in the translation of the book “La Tachzan” into Indonesia. The method used in this research is the descriptive qualitative method. From the data examined, it is found that the shif... see more

Vigenère Cipher is one of the well-known ciphering algorithms of the past. Modifications to Vigenère Cipher algorithm is made to improve its security, making it more difficult to decipher by a cryptanalyst. Due to the nature of the algorithm, these measur... see more

1 of 53 pages  |  10  records  |  more records»