Results 111 to 120 of about 24,382 (331)

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Exploring maximum achievable product purities in a multiple dividing wall column

open access: yesAIChE Journal, EarlyView.
Abstract The well‐established concept of dividing wall columns can be advanced into multiple dividing wall columns. These columns can theoretically achieve any number of pure fractions and offer major potential investment and energy savings compared to conventional sequences.
Yannick Waibel   +3 more
wiley   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography [PDF]

open access: gold, 2021
Ghadah Aldabbagh   +5 more
openalex   +1 more source

From Droplet to Diagnosis: Spatio‐Temporal Pattern Recognition in Drying Biofluids

open access: yesAdvanced Intelligent Systems, EarlyView.
This article integrates machine learning (ML) with the spatio‐temporal evolution of biofluid droplets to reveal how drying and self‐assembly encode distinctive compositional fingerprints. By leveraging textural features and interpretable ML, it achieves robust classification of blood abnormalities with over 95% accuracy.
Anusuya Pal   +2 more
wiley   +1 more source

Enkripsi SMS menggunakan ECC (Elliptic Curve Cryptography) [PDF]

open access: yes, 2010
SMS or Short Message Service is a short messaging service via mobile phone. Although it is part of the first phase of the GSM standard capabilities, SMS is still a service that is widely used by many people.
Mardianto, Eko   +2 more
core  

Medical Image Detection & Privacy Management With Elliptic Curve GOPSO Cryptographic Optimization Technique on the Internet of Health Things [PDF]

open access: green, 2021
Anthony Vincent B   +5 more
openalex   +1 more source

Bridging High‐Fidelity Simulations and Physics‐Based Learning using a Surrogate Model for Soft Robot Control

open access: yesAdvanced Intelligent Systems, EarlyView.
A surrogate‐model‐based framework is proposed for combining high‐fidelity finite element method and efficient physics simulations to enable fast, accurate soft robot simulation for reinforcement learning, validated through sim‐to‐real experiments. Soft robotics holds immense promise for applications requiring adaptability and compliant interactions ...
Taehwa Hong   +3 more
wiley   +1 more source

Disentangling complex relationships and disjunctions in western Camassia: Integrating multiple criteria to resolve taxonomic boundaries

open access: yesAmerican Journal of Botany, EarlyView.
Abstract Premise Understanding genetic and morphological variability helps efforts to sustain landscapes and develop effective species concepts for resolving difficult groups. To unravel puzzling relationships and range disjunctions, we applied morphometrics, phenology, phylogenetics and population genetics in Camassia species with cultural, ecological,
Susan R. Kephart   +5 more
wiley   +1 more source

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

Home - About - Disclaimer - Privacy