Results 111 to 120 of about 24,382 (331)
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Exploring maximum achievable product purities in a multiple dividing wall column
Abstract The well‐established concept of dividing wall columns can be advanced into multiple dividing wall columns. These columns can theoretically achieve any number of pure fractions and offer major potential investment and energy savings compared to conventional sequences.
Yannick Waibel +3 more
wiley +1 more source
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography [PDF]
Ghadah Aldabbagh +5 more
openalex +1 more source
From Droplet to Diagnosis: Spatio‐Temporal Pattern Recognition in Drying Biofluids
This article integrates machine learning (ML) with the spatio‐temporal evolution of biofluid droplets to reveal how drying and self‐assembly encode distinctive compositional fingerprints. By leveraging textural features and interpretable ML, it achieves robust classification of blood abnormalities with over 95% accuracy.
Anusuya Pal +2 more
wiley +1 more source
Enkripsi SMS menggunakan ECC (Elliptic Curve Cryptography) [PDF]
SMS or Short Message Service is a short messaging service via mobile phone. Although it is part of the first phase of the GSM standard capabilities, SMS is still a service that is widely used by many people.
Mardianto, Eko +2 more
core
Medical Image Detection & Privacy Management With Elliptic Curve GOPSO Cryptographic Optimization Technique on the Internet of Health Things [PDF]
Anthony Vincent B +5 more
openalex +1 more source
A surrogate‐model‐based framework is proposed for combining high‐fidelity finite element method and efficient physics simulations to enable fast, accurate soft robot simulation for reinforcement learning, validated through sim‐to‐real experiments. Soft robotics holds immense promise for applications requiring adaptability and compliant interactions ...
Taehwa Hong +3 more
wiley +1 more source
Abstract Premise Understanding genetic and morphological variability helps efforts to sustain landscapes and develop effective species concepts for resolving difficult groups. To unravel puzzling relationships and range disjunctions, we applied morphometrics, phenology, phylogenetics and population genetics in Camassia species with cultural, ecological,
Susan R. Kephart +5 more
wiley +1 more source
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core

