Results 31 to 40 of about 467 (189)
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the ...
Qinmao Jiang, Simin Yu, Qianxue Wang
doaj +1 more source
Sustainable Rural Livelihood Security in the Backward Districts of Maharashtra
AbstractThe paper covers the BAIF led National Agricultural Innovations Project is an initiative by ICAR and supported by the World Bank. (NAIP) (Component 3- NAIP has four component with component 3 on livelihood security) subproject which commenced in 2007 in 76 villages of five backward districts of Maharashtra India with the objective of developing
Ramchandani, Raji Ajwani +1 more
openaire +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Financial Distress and Its Determinants in Rheumatoid Arthritis
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler +5 more
wiley +1 more source
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
The Latticed-Based Path Privacy Protection Aggregation Scheme for Internet of Vehicles
With the occurrence of information leakage events of online ride-hailing, the information security of Internet of Vehicles has been highly valued by the society.
Cheng Wei +3 more
doaj +1 more source
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible [PDF]
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem ...
Mihir Bellare +2 more
openaire +1 more source
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan +3 more
wiley +1 more source

