Results 11 to 20 of about 755,843 (383)

Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

open access: hybridNonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj   +3 more sources

A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application

open access: yesElectronics, 2021
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes.
T. Kumar   +4 more
semanticscholar   +1 more source

Digitalisation and Modernisation of Hydropower Operating Facilities to Support the Colombian Energy Mix Flexibility

open access: yesEnergies, 2023
Hydropower plants cover almost 70% of the Colombian electrical demand, were built several decades ago, and present low levels of digitisation compared to other modern power-generation technologies, e.g., wind turbines, solar PV plants, and recently buil ...
Aldemar Leguizamon-Perilla   +6 more
doaj   +1 more source

Band planting: a new restoration technique under the multi-criteria analysis of ecological functionality

open access: yesRevista Brasileira de Ciências Ambientais, 2022
We evaluated band planting (BP) to assess its efficiency in the early restoring of ecological processes using a multi-criteria protocol known as Framework for the Evaluation of Natural Resource Management Systems Incorporating Sustainability Indicators ...
Bruno Santos Francisco   +7 more
doaj   +1 more source

Exploring the causes of adverse events in hospitals and potential prevention strategies [PDF]

open access: yes, 2010
Objectives To examine the causes of adverse events (AEs) and potential prevention strategies to minimise the occurrence of AEs in hospitalised patients.
Groenewegen, P.P.,   +6 more
core   +8 more sources

Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection

open access: yesElektronika ir Elektrotechnika, 2023
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now.
Amjed Abbas Ahmed   +4 more
doaj   +1 more source

A modified Matrices Approach in Advanced Encryption Standard Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2019
The cryptographic algorithms became the main proceeding for protection of very important data from unauthorized access. There are several cryptographic algorithms to ensure the data, but algorithms must be selected according to speed, strength and the ...
Abdul Monem Rahma, Atheer Abbas
doaj   +1 more source

Comparison Of Biochemical Markers and Insulin Resistance of Polycystic Ovary Syndrome Patients Diagnosed with the Criteria of Rotterdam, Androgen Excess Society and National Institutes of Health

open access: yesHitit Medical Journal, 2023
Objective: There are different criteria to diagnose polycystic ovary syndrome (PCOS) such as Rotterdam Consensus, Androgen Excess Society (AES), and National Institutes of Health (NIH).
Ebru Celik   +4 more
doaj   +1 more source

Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj   +1 more source

Home - About - Disclaimer - Privacy