Results 21 to 30 of about 275,265 (273)
Tıbbi DICOM Veri Güvenliğinde Hibrit Yöntemlerin Kullanılması
DICOM (Digital Imaging and Communications in Medicine – Tıpta Dijital Görüntüleme ve İletişim) tıbbi görüntülerin arşivlenmesi, daha sonradan kullanılması, farklı yerlere dağıtılması ve sunulmasını sağlayan bir dosya standartıdır. Bu standartta dosyalar,
İnan Güler +2 more
doaj +1 more source
Hybrid Consensus Algorithm Based on Modified Proof-of-Probability and DPoS
As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying
Baocheng Wang, Zetao Li, Haibin Li
doaj +1 more source
Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards.
El-Douh Ahmed Abdel-Rahim +3 more
doaj +1 more source
HungerHash: A Distributed Network for Child-Hunger Relief based on Hedera Hashgraph
This paper proposes a hunger relief network based on crypto-currency and a hybrid mix of centralized and decentralized databases which is totally formed by the volunteers and donors and is out of control of centralized organizations. The centralized part
Kubra Kalkan, Naser Jam
doaj +1 more source
Realization of different-shaped electromagnetic band gap antennas for Wi-Fi applications [PDF]
The primary objective of this paper is to conduct a comparative analysis of diverse Electromagnetic Band Gap (EBG) antennas in terms of their suitability for Wi-Fi applications operating at 5 GHz.
Premalatha Bantupalli +3 more
doaj +1 more source
Coverless VoIP Steganography Using Hash and Hash
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj +1 more source
Preservation of Digital Images: Question of Fixity
One of the most important aspects of the long-term digital-image preservation strategy is maintaining data fixity, i.e., assuring the integrity and authenticity of original data.
Alexey Tikhonov
doaj +1 more source
Search for supersymmetry in final states with jets, missing transverse momentum and one isolated lepton in √s=7 TeV pp collisions using 1 fb-1 of ATLAS data [PDF]
We present an update of a search for supersymmetry in final states containing jets, missing transverse momentum, and one isolated electron or muon, using 1.04 fb-1 of proton-proton collision data at √s=7 TeV recorded by the ATLAS experiment at the LHC ...
Farrington, Sinead, HASH(0x5574f3d9edb8)
core +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
C Source code Obfuscation using Hash Function and Encryption Algorithm
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj +1 more source

