Results 81 to 90 of about 133,184 (295)

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Advanced Cellulose‐Based Gels for Wearable Physiological Monitoring: From Fiber Modification to Application Optimization

open access: yesAdvanced Functional Materials, EarlyView.
This review discusses cellulose‐based hydrogels technology, analyzes their application progress in physiological signal monitoring, and explores the effects of pretreatment, crosslinking, and molding methods on gel performance, to provide valuable insights into the efficient utilization of plant fibers and the environmentally friendly development of ...
Zhiming Wang   +8 more
wiley   +1 more source

Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]

open access: yesHangkong bingqi
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj   +1 more source

Progressive Insights into 3D Bioprinting for Corneal Tissue Restoration

open access: yesAdvanced Healthcare Materials, EarlyView.
This review explores the potential of 3D bioprinting to replicate the complex structure and function of the human cornea. It highlights key advances in bioink development, printing modalities, and in vivo performance, while addressing current challenges and emerging strategies. The review emphasizes bioprinting's promise to overcome donor shortages and
Ilayda Namli   +6 more
wiley   +1 more source

State‐of‐the‐Art, Insights, and Perspectives for MOFs‐Nanocomposites and MOF‐Derived (Nano)Materials

open access: yesAdvanced Materials, EarlyView.
Different approaches to MOF‐NP composite formation, such as ship‐in‐a‐bottle, bottle‐around‐the‐ship and in situ one‐step synthesis, are used. Owing to synergistic effects, the advantageous features of the components of the composites are beneficially combined, and their individual drawbacks are mitigated.
Stefanos Mourdikoudis   +6 more
wiley   +1 more source

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing

open access: yesIEEE Access, 2019
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding   +5 more
doaj   +1 more source

Fault Attack of SMS4 Based on Internal Collisions

open access: yesJournal of Physics: Conference Series, 2020
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the ...
Fang Luo, Renjie Zhu, Qingyu Ou
openaire   +2 more sources

On the dynamics of chemical reactions of negative ions

open access: yes, 2010
This review discusses the dynamics of negative ion reactions with neutral molecules in the gas phase. Most anion-molecule reactions proceed via a qualitatively different interaction potential than cationic or neutral reactions.
Mikosch, Jochen   +2 more
core   +1 more source

How Does a Delicate Insect Wing Resist Damage? Chitin Orientation Is Adapted to the Mechanical Demands at the Nanoscale

open access: yesAdvanced Materials, EarlyView.
Nanoscale chitin fiber orientations in the insect wing play a critical role in adapting to complex mechanical demands. These findings reveal two distinct and functionally adaptive chitin orientation patterns in the membranes that vary regionally, optimizing mechanical resilience and deformation control.
Chuchu Li   +5 more
wiley   +1 more source

A second pre-image attack and a collision attack to cryptographic hash function lux

open access: yesCommunications Faculty Of Science University of Ankara Series A1Mathematics and Statistics, 2017
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new
SULAK, Fatih   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy