Results 51 to 60 of about 1,200 (188)

Improving the learning experience in an undergraduate course on microbial metabolism by using an illustrated story

open access: yesBiochemistry and Molecular Biology Education, Volume 53, Issue 2, Page 131-141, March/April 2025.
Abstract In the classroom, metabolism is often approached and received as a mundane exercise in memorization. Teaching metabolism also faces the challenge of negative perceptions that can impede learning. We sought to improve the learning experience in an undergraduate lecture course on microbial metabolism by implementing an illustrated story that ...
James B. McKinlay, Katherine Kearns
wiley   +1 more source

Chosen-IV Algebraic Attack on Randomized Ciphers FASTA and HERA

open access: yesIACR Transactions on Symmetric Cryptology
Fully homomorphic encryption (FHE) enables computation on encrypted data without decryption, providing strong guarantees for privacy-preserving applications.
Fukang Liu   +6 more
doaj   +1 more source

Optimal model‐based design of experiments for parameter precision: Supercritical extraction case

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley   +1 more source

Static and Dynamic Analysis of Porous Gas Bearings Lubricated With Air, Refrigerant R‐134a, Helium and Hydrogen

open access: yesLubrication Science, EarlyView.
ABSTRACT Porous gas bearings (PGBs) enable high‐speed, oil‐free operation in modern rotating machinery. This study develops a coupled thermo‐hydrodynamic (THD) model for a cylindrical porous gas bearing lubricated with four working fluids—air, R‐134a, helium and hydrogen.
S. Bechiri, B. Bouchehit, B. Bou‐Saïd
wiley   +1 more source

Constructing Two Classes of Boolean Functions With Good Cryptographic Properties

open access: yesIEEE Access, 2019
Wu et al. proposed a generalized Tu-Deng conjecture over $\mathbb {F}_{2^{rm}}\times {\mathbb {F}_{2^{m}}}$ , and constructed Boolean functions with good properties. However the proof of the generalized conjecture is still open.
Yindong Chen   +3 more
doaj   +1 more source

Extending the hyper‐logistic model to the random setting: New theoretical results with real‐world applications

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés   +2 more
wiley   +1 more source

Hybrid tabu search algorithm for excellent Boolean function

open access: yesTongxin xuebao, 2022
Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation ...
Weiqiong WANG   +3 more
doaj   +2 more sources

Performance research of the T′ algorithm over GF(2)

open access: yesTongxin xuebao, 2011
The XSL algorithm is a method for solving systems of multivariate polynomial equations based on the linearization method on GF(2),and the T ’ method is the final stage of the XSL algorithm before linearization.Through analysis revealed that the T ...
GUO Wen-ping 1, AN Jin-liang2
doaj  

From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama   +2 more
wiley   +1 more source

Algebraic and Slide Attacks on KeeLoq [PDF]

open access: yes, 2008
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy