Estimation of Purkait’s triangle method and alternative models for sex assessment from the proximal femur in the Spanish population

2015 ◽  
Vol 130 (1) ◽  
pp. 245-251 ◽  
Author(s):  
Mirjana Djorojevic ◽  
Concepción Roldán ◽  
Miguel Botella ◽  
Inmaculada Alemán
2006 ◽  
Author(s):  
Raquel Vilar-Lopez ◽  
Maria Bellon ◽  
Carlos Font ◽  
Manuel Gomez-Rio ◽  
Jose M. Llamas-Elvira ◽  
...  
Keyword(s):  

2019 ◽  
Vol 33 (2) ◽  
pp. 143-153
Author(s):  
Raymond E. Petren ◽  
David T. Lardier ◽  
Jacqueline Bible ◽  
Autumn Bermea ◽  
Brad van Eeden-Moorefield

1979 ◽  
Vol 18 (06) ◽  
pp. 290-292 ◽  
Author(s):  
R. Lahtinen ◽  
T. Lahtinen

SummaryA l33Xe washout method has been used for measuring changes of blood flow in the proximal femur of a patient with the blastic crisis of chronic granulocytic leukaemia. In the hyperplastic phase the blood flow was highly increased and over three times greater than in the hypoplastic phase of the disease and over thirteen times greater than the value in normal bone. The bone circulation and especially the first component of the two-exponential bone washout curves appeared to reflect cell proliferation and neoplastic activity of the whole bone marrow. The method may provide clinically important information in the follow-up of selected haematological diseases.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


Sign in / Sign up

Export Citation Format

Share Document