Results 51 to 60 of about 1,200 (188)
Abstract In the classroom, metabolism is often approached and received as a mundane exercise in memorization. Teaching metabolism also faces the challenge of negative perceptions that can impede learning. We sought to improve the learning experience in an undergraduate lecture course on microbial metabolism by implementing an illustrated story that ...
James B. McKinlay, Katherine Kearns
wiley +1 more source
Chosen-IV Algebraic Attack on Randomized Ciphers FASTA and HERA
Fully homomorphic encryption (FHE) enables computation on encrypted data without decryption, providing strong guarantees for privacy-preserving applications.
Fukang Liu +6 more
doaj +1 more source
Optimal model‐based design of experiments for parameter precision: Supercritical extraction case
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley +1 more source
ABSTRACT Porous gas bearings (PGBs) enable high‐speed, oil‐free operation in modern rotating machinery. This study develops a coupled thermo‐hydrodynamic (THD) model for a cylindrical porous gas bearing lubricated with four working fluids—air, R‐134a, helium and hydrogen.
S. Bechiri, B. Bouchehit, B. Bou‐Saïd
wiley +1 more source
Constructing Two Classes of Boolean Functions With Good Cryptographic Properties
Wu et al. proposed a generalized Tu-Deng conjecture over $\mathbb {F}_{2^{rm}}\times {\mathbb {F}_{2^{m}}}$ , and constructed Boolean functions with good properties. However the proof of the generalized conjecture is still open.
Yindong Chen +3 more
doaj +1 more source
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés +2 more
wiley +1 more source
Hybrid tabu search algorithm for excellent Boolean function
Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation ...
Weiqiong WANG +3 more
doaj +2 more sources
Performance research of the T′ algorithm over GF(2)
The XSL algorithm is a method for solving systems of multivariate polynomial equations based on the linearization method on GF(2),and the T ’ method is the final stage of the XSL algorithm before linearization.Through analysis revealed that the T ...
GUO Wen-ping 1, AN Jin-liang2
doaj
From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama +2 more
wiley +1 more source
Algebraic and Slide Attacks on KeeLoq [PDF]
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois +2 more
openaire +1 more source

