Results 11 to 20 of about 6,519,461 (316)

Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices

open access: yesCryptography, 2022
Many Internet of Things (IoT) devices use an Advanced Encryption Standard (AES) algorithm to secure data stored and transmitted during the communication process. The AES algorithm often suffers DC (DC) attacks. Little has been done to prevent DC attacks,
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Different symmetries, different mechanisms

open access: yesAttention, Perception, & Psychophysics, 2022
AbstractThree common symmetries exist in the natural visual world: (i) mirror symmetry, i.e., reflections around a vertical axis, (ii) radial symmetry, i.e., rotations around a point, and (iii) translational symmetry, i.e., shifted repetitions. Are these processed by a common class of visual mechanism?
Jennings, B   +3 more
openaire   +4 more sources

A Stronghold of Climate Change Denialism in Germany: Case Study of the Output and Press Representation of the Think Tank EIKE

open access: yesInternational Journal of Communication, 2022
Climate change denialist think tanks have played a major role in climate obstructionism in the United States, and we are beginning to learn that there are also certain European think tanks acting in line with their U.S. counterparts.
Jose A. Moreno   +2 more
doaj   +2 more sources

Seeing the bigger picture: what is gynaecology for?

open access: yesÁgora, 2021
This paper situates Rodrigo de Castro Lusitano’s De uniuersa mulierum medicina (1603), within the longer history of gynaecology and of the questions raised by having a separate branch of medicine dedicated to women.
Helen King
doaj   +1 more source

Performing neutrality in ‘post’-conflict Burundi

open access: yesNordic Journal of African Studies, 2020
The reintegration of ex-combatants has a number of dimensions: economic, social, and political. This article explores what reintegration, defined as the shedding of the ex-combatant identity, means for the political participation of former combatants in
Guðrún Sif Friðriksdóttir
doaj   +1 more source

Documenting Attachment: 'Affective border control in applications for family reunification'

open access: yesNordic Journal of Migration Research, 2019
From 2002 to 2018, Denmark was the only country in the world to enforce a migration law demanding that couples seeking family reunification in Denmark documented their combined “attachment” to the Danish nation.
Sofie Jeholm, Mons Bissenbakker
doaj   +1 more source

Nonlocal Integro-Differential Equations of the Second Order with Degeneration

open access: yesMathematics, 2020
We study the solvability for boundary value problems to some nonlocal second-order integro–differential equations that degenerate by a selected variable.
Aleksandr I. Kozhanov
doaj   +1 more source

Southern Urbanism, Legalization, and the Limits of Migration Law

open access: yesAJIL Unbound, 2017
As a relatively well-defined subset of global migration law, refugee law and policy present important sites for contestation, agenda setting, normative pronouncements, and symbolic action.
Loren B. Landau
doaj   +1 more source

Ev/ اَوْ Bağlacının İfadeye Kattığı Farklı Anlamların Türkçe Meâllere Aktarımı Sorunu

open access: yesCumhuriyet İlahiyat Dergisi, 2021
Dilde kullanılan kelimelerin genel olarak bir asıl/temel manası bulunmasının yanı sıra, bu kelimeler zamanla temel anlamının dışında yeni ve özel anlamlar kazanır. Ortaya çıkan bu anlamlar temel anlamdan bütünüyle bağımsız olmaz.
Ahmet Karadağ
doaj   +1 more source

On Middles and Thirds

open access: yesComputer Sciences & Mathematics Forum, 2023
The purpose of this paper is to revisit the concepts of a third in logic and philosophy that have existed since antiquity, widely separated in time and space, but expressing what we consider a higher level of understanding, without going outside the ...
Joseph Brenner, Zhensong Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy