Results 31 to 40 of about 467 (189)

Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map

open access: yesEntropy, 2023
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the ...
Qinmao Jiang, Simin Yu, Qianxue Wang
doaj   +1 more source

Sustainable Rural Livelihood Security in the Backward Districts of Maharashtra

open access: yesProcedia - Social and Behavioral Sciences, 2014
AbstractThe paper covers the BAIF led National Agricultural Innovations Project is an initiative by ICAR and supported by the World Bank. (NAIP) (Component 3- NAIP has four component with component 3 on livelihood security) subproject which commenced in 2007 in 76 villages of five backward districts of Maharashtra India with the objective of developing
Ramchandani, Raji Ajwani   +1 more
openaire   +1 more source

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Financial Distress and Its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler   +5 more
wiley   +1 more source

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

The Latticed-Based Path Privacy Protection Aggregation Scheme for Internet of Vehicles

open access: yesIEEE Access, 2022
With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society.
Cheng Wei   +3 more
doaj   +1 more source

Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible [PDF]

open access: yes, 1998
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem ...
Mihir Bellare   +2 more
openaire   +1 more source

On‐Demand Activation of Thin Alginate Shell Encapsulated Volatile Liquid for Untethered Pneumatic Soft Actuation

open access: yesAdvanced Engineering Materials, EarlyView.
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy