Results 71 to 80 of about 211,629 (261)

Insights into the Dynamics and Binding Mechanisms of the Alkhumra Virus NS2B/NS3 Protease: A Molecular Dynamics Study

open access: yesAdvanced Theory and Simulations, EarlyView.
The ΔRMSF$\Delta {\rm RMSF}$ analysis reveals significant flexibility differences between free NS3 and the NS2B/NS3 complex, with notable deviations in specific regions. Key residues driving NS2B binding are identified, and the protonation state of catalytic serine affects oxyanion hole formation.
Jurica Novak   +2 more
wiley   +1 more source

Black and minority ethnic student teachers' stories as empirical documents of hidden oppressions: Using the personal to turn towards the structural

open access: yesBritish Educational Research Journal, Volume 48, Issue 6, Page 1145-1160, December 2022., 2022
Abstract Racism, as a covert but pervasive presence in teacher education in England, remains a major structural issue and its effects on student teachers who are Black and Asian are real and troubling. Their personal stories reveal multiple challenges and present empirical evidence that can usefully be analysed to examine their experience of daily ...
Diane Warner
wiley   +1 more source

Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]

open access: yes, 2014
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa   +2 more
core   +1 more source

A generic attack to ciphers [PDF]

open access: yesarXiv, 2007
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
arxiv  

Adversarial collision attacks on image hashing functions [PDF]

open access: yesarXiv, 2020
Hashing images with a perceptual algorithm is a common approach to solving duplicate image detection problems. However, perceptual image hashing algorithms are differentiable, and are thus vulnerable to gradient-based adversarial attacks. We demonstrate that not only is it possible to modify an image to produce an unrelated hash, but an exact image ...
arxiv  

Exploration of Half‐Cycle Length of Converging Circular Wavy Duct with Diverging‐Outlet: Turbulent Water Dynamics

open access: yesAdvanced Theory and Simulations, EarlyView.
Increasing half‐cycles intensifies turbulence due to enhanced vortex interactions and flow separation at the diverged‐outlets. Longer wavy ducts are shown to increase flow acceleration, resulting in greater output velocities and more turbulent‐kinetic‐energy production. Wave‐period plays a crucial role in determining turbulent intensity, with amplitude
I. L. Animasaun   +2 more
wiley   +1 more source

Yoyo trick on type‐II generalised Feistel networks

open access: yesIET Information Security, 2021
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj   +1 more source

Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]

open access: yes, 1977
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A.   +3 more
core   +1 more source

Mechanochemistry: Fundamental Principles and Applications

open access: yesAdvanced Science, EarlyView.
In this review, the physicochemical principles of mechanochemistry are first clarified. Based on this foundation, the research basis and cutting‐edge scientific achievements in four areas are introduced: solid‐state organic chemistry, polymers, interface science, and biomechanochemistry.
Liang Dong   +4 more
wiley   +1 more source

Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]

open access: yes, 2016
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy