Results 41 to 50 of about 717,304 (368)
A Cyber Security Approach Using Multilayer Cryptographic System
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim +4 more
doaj +1 more source
The relative contributions of adaptation and genetic drift to morphological diversification of the skulls of echolocating mammals were investigated using two horseshoe bat species, Rhinolophus simulator and R. cf. simulator, as test cases.
Gregory L. Mutumi +2 more
doaj +1 more source
AES Encryption and A Cryptosystem Obtained with Soft Set II
In this paper, a new cryptographic algorithm was created with the soft sets, symmetricgroups, soft matrices representing soft sets, and AES. In 1999, by Molodtsov proposed soft settheory as a new mathematical tool to deal with uncertainties.
Emin Aygün
doaj +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
Acute encephalitis syndrome surveillance, Kushinagar district, Uttar Pradesh, India, 2011-2012 [PDF]
In India, quality surveillance for acute encephalitis syndrome (AES), including laboratory testing, is necessary for understanding the epidemiology and etiology of AES, planning interventions, and developing policy.
Arunachalam +20 more
core +1 more source
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
semanticscholar +1 more source
Sustainable energy management systems are part of the global energy transition by digitally transforming utility companies throughout the past decade. Industry 4.0 (4IR) has been adopted to improve competitiveness and align its processes with trends that
Nhora Parra +7 more
doaj +1 more source
Empirical evaluation of an adaptive e-learning system and the effects of knowledge, learning styles and multimedia mode on student achievement [PDF]
This paper presents an empirical evaluation of an adaptive e-learning system (AES). The system was evaluated in an experimental research. During the 9 weeks of experimentation, the students studied the learning material in two randomly allocated groups ...
Surjono, Herman Dwi
core
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Identification and Characterization of AES-135, a Hydroxamic Acid-Based HDAC Inhibitor That Prolongs Survival in an Orthotopic Mouse Model of Pancreatic Cancer [PDF]
Pancreatic ductal adenocarcinoma (PDAC) is an aggressive, incurable cancer with a 20% 1 year survival rate. While standard-of-care therapy can prolong life in a small fraction of cases, PDAC is inherently resistant to current treatments, and novel ...
Adile, Ashley A. +19 more
core +3 more sources

