Results 51 to 60 of about 253,734 (274)

JPEG Privacy and Security framework for social networking and GLAM services

open access: yesEURASIP Journal on Image and Video Processing, 2017
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans   +6 more
doaj   +1 more source

Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map

open access: yesEntropy, 2023
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the ...
Qinmao Jiang, Simin Yu, Qianxue Wang
doaj   +1 more source

Sustainable Rural Livelihood Security in the Backward Districts of Maharashtra

open access: yesProcedia - Social and Behavioral Sciences, 2014
AbstractThe paper covers the BAIF led National Agricultural Innovations Project is an initiative by ICAR and supported by the World Bank. (NAIP) (Component 3- NAIP has four component with component 3 on livelihood security) subproject which commenced in 2007 in 76 villages of five backward districts of Maharashtra India with the objective of developing
Ramchandani, Raji Ajwani   +1 more
openaire   +1 more source

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

A classical key distribution system based on Johnson (like) noise - How secure? [PDF]

open access: yes, 2006
We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [1]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key.
Amnon Yariv   +3 more
core   +2 more sources

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

open access: yes, 2008
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro   +34 more
core   +1 more source

Coexistence of continuous variable QKD with intense DWDM classical channels

open access: yes, 2015
We demonstrate experimentally the feasibility of continuous variable quantum key distribution (CV-QKD) in dense-wavelength-division multiplexing networks (DWDM), where QKD will typically have to coexist with several co- propagating (forward or backward ...
Alléaume, Romain   +2 more
core   +1 more source

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy