Results 51 to 60 of about 253,734 (274)
JPEG Privacy and Security framework for social networking and GLAM services
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans +6 more
doaj +1 more source
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the ...
Qinmao Jiang, Simin Yu, Qianxue Wang
doaj +1 more source
Sustainable Rural Livelihood Security in the Backward Districts of Maharashtra
AbstractThe paper covers the BAIF led National Agricultural Innovations Project is an initiative by ICAR and supported by the World Bank. (NAIP) (Component 3- NAIP has four component with component 3 on livelihood security) subproject which commenced in 2007 in 76 villages of five backward districts of Maharashtra India with the objective of developing
Ramchandani, Raji Ajwani +1 more
openaire +1 more source
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
A classical key distribution system based on Johnson (like) noise - How secure? [PDF]
We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [1]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key.
Amnon Yariv +3 more
core +2 more sources
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro +34 more
core +1 more source
Coexistence of continuous variable QKD with intense DWDM classical channels
We demonstrate experimentally the feasibility of continuous variable quantum key distribution (CV-QKD) in dense-wavelength-division multiplexing networks (DWDM), where QKD will typically have to coexist with several co- propagating (forward or backward ...
Alléaume, Romain +2 more
core +1 more source
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source

