Results 11 to 20 of about 6,416 (199)
Robustly correlated key‐medical image for DNA‐chaos based encryption
Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash ...
Ichraf Aouissaoui +2 more
wiley +1 more source
This study demonstrates how the three main ligand‐induced inhibition effects—the dissolution enhanced acid wall, the oxidant scavenging behavior, as well as the steric and electrostatic repulsive nature—of ferrous citrate can be overcome to obtain ferromagnetic magnetite nanoparticles using the method of thermally assisted oxidative precipitation ...
Tim Granath, Karl Mandel, Peer Löbmann
wiley +1 more source
Smart-M3 security: Authentification anc authorization mechanisms [PDF]
Smart spaces are dynamic environments for sharing device information. Key challenges for smart spaces include security and interoperability between heterogeneous devices. Thus, smart spaces and its environments must provide feasible solutions for authentication, access control and privacy. Open source Smart Space platform Smart-M3 is actively developed
Yudenok, Kirill, Nikolaevskiy, Ilya
openaire +2 more sources
Abstract BACKGROUND A promising way to overcome the susceptibility of Vitis vinifera L. to fungal diseases is the integration of genetic resistance by the interspecific crossing between V. vinifera varieties and resistant species. However, the products of such hybrids are still not accepted by customers, particularly due to their organoleptic ...
Verena Gratl +6 more
wiley +1 more source
Background. Artemisia negrei L. (A. negrei) is a medicinal and aromatic plant belonging to the family Asteraceae that is more widespread in the folded Middle Atlas Mountains, Morocco. Materials and Methods. This study was run to investigate the phytochemical composition and antioxidant, antibacterial, and antifungal activities of Artemisia negrei L ...
Khalid Chebbac +6 more
wiley +1 more source
Lightweight Cryptography for Network‐on‐Chip Data Encryption
System‐on‐chip (SoC) is the main processor for most recent applications such as the Internet of things (IoT). SoCs are composed of multiple blocks that communicate with each other through an integrated router. Data routing from a block to another poses many challenges.
Riadh Ayachi +3 more
wiley +1 more source
Temperature control is the key element during medicine storage. Pharmacies sell some medical products which are kept in fridges. The opening and closing of the fridge while taking some medicine makes the outside hot air enter the fridge, which will increase the inner fridge temperature.
Joseph Habiyaremye +6 more
wiley +1 more source
This paper presents elements of a theory of “authentification”. The focus is on socio-semiotical practices of identification and access control as part of social struggles for the distribution of limited resources.
Friedemann Vogel
doaj +1 more source
Adulterating meat products with several species, including non-halal species, is often found in commercial products. This study aims to design and validate the Cytochrome c oxidase subunit I (CO1) primers to detect the non-halal species.
Joni Kusnadi +5 more
doaj +1 more source
R behind the scenes: Using S the (un)usual way [PDF]
R is not only a program for analyzing and visualizing data, it is an open and programmable software environment. It can not only easily access other programs written in a wide variety of languages, but also be accessed itself from other programs. As such,
Leisch, Friedrich
core +1 more source

