Results 81 to 90 of about 133,184 (295)
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
This review discusses cellulose‐based hydrogels technology, analyzes their application progress in physiological signal monitoring, and explores the effects of pretreatment, crosslinking, and molding methods on gel performance, to provide valuable insights into the efficient utilization of plant fibers and the environmentally friendly development of ...
Zhiming Wang +8 more
wiley +1 more source
Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj +1 more source
Progressive Insights into 3D Bioprinting for Corneal Tissue Restoration
This review explores the potential of 3D bioprinting to replicate the complex structure and function of the human cornea. It highlights key advances in bioink development, printing modalities, and in vivo performance, while addressing current challenges and emerging strategies. The review emphasizes bioprinting's promise to overcome donor shortages and
Ilayda Namli +6 more
wiley +1 more source
State‐of‐the‐Art, Insights, and Perspectives for MOFs‐Nanocomposites and MOF‐Derived (Nano)Materials
Different approaches to MOF‐NP composite formation, such as ship‐in‐a‐bottle, bottle‐around‐the‐ship and in situ one‐step synthesis, are used. Owing to synergistic effects, the advantageous features of the components of the composites are beneficially combined, and their individual drawbacks are mitigated.
Stefanos Mourdikoudis +6 more
wiley +1 more source
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding +5 more
doaj +1 more source
Fault Attack of SMS4 Based on Internal Collisions
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the ...
Fang Luo, Renjie Zhu, Qingyu Ou
openaire +2 more sources
On the dynamics of chemical reactions of negative ions
This review discusses the dynamics of negative ion reactions with neutral molecules in the gas phase. Most anion-molecule reactions proceed via a qualitatively different interaction potential than cationic or neutral reactions.
Mikosch, Jochen +2 more
core +1 more source
Nanoscale chitin fiber orientations in the insect wing play a critical role in adapting to complex mechanical demands. These findings reveal two distinct and functionally adaptive chitin orientation patterns in the membranes that vary regionally, optimizing mechanical resilience and deformation control.
Chuchu Li +5 more
wiley +1 more source
A second pre-image attack and a collision attack to cryptographic hash function lux
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new
SULAK, Fatih +4 more
openaire +4 more sources

