Results 111 to 120 of about 13,015 (291)

Quantitative blood loss values reveal high rates of undiagnosed postpartum hemorrhage

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract Objective In this study, we examined quantitative blood loss (QBL) values and postpartum hemorrhage (PPH) diagnoses in relation to clinical, demographic, and hospitalization related variables. Methods A retrospective chart review was conducted of deliveries at a regional hospital over a nine‐month period, querying patient demographics, PPH ...
Burhan A. Khan   +6 more
wiley   +1 more source

Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

open access: yesIET Networks, Volume 12, Issue 1, Page 1-8, January 2023., 2023
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley   +1 more source

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

Multicollision attacks and generalized iterated hash functions

open access: yesJournal of Mathematical Cryptology, 2010
We apply combinatorics on words to develop an approach to multicollisions in generalized iterated hash functions. Our work is based on the discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir.
Kortelainen Juha   +2 more
doaj   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Named data network dynamic cache placement strategy based on programmable data plane

open access: yesIET Networks, Volume 12, Issue 1, Page 27-35, January 2023., 2023
A dynamic cache placement strategy is proposed to classify content according to whether is a need for retransmission. And the dynamic cache placement strategy and data plane forwarding function are realized by using the programmable language. Abstract Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network ...
Saifeng Hou, Yuxiang Hu, Le Tian
wiley   +1 more source

Guest Editorial: Multi‐view representation learning for computer vision

open access: yes, 2023
IET Computer Vision, EarlyView.
Xin Ning   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy