Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method. [PDF]
Hamad S, Rashid OF, Al-Dabbas HM.
europepmc +1 more source
Formation of Distance‐Based Orientation: Political Identity through Relational Positioning in Israel
Distance‐based orientation describes how pejorative labels may serve as anchor points for political identity. Existing research on political labeling has largely emphasized stigmatization, overlooking how labels may acquire durability and orienting capacity without losing pejorative force. Drawing on publicly circulating discourse, we trace positioning
Tammar Friedman, Asaf Saadon
wiley +1 more source
Multi-Dimensional Acoustic Cascaded Holographic Encryption with Instantaneous Visual Decryption via Particle Manipulation. [PDF]
Lin Q +8 more
europepmc +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Enhanced classification prostate cancer based on generative adversarial networks and integrated deep learning with vision transformer models. [PDF]
Salama WM, Aly MH.
europepmc +1 more source
It's Not You, It's the System: Women Professors in TESOL and the Persistence of Gender Bias
Abstract Although progress has been made with respect to the role and position of women in academia, overt and covert discrimination as well as structural and systemic bias persist. In this article, we report on research conducted with 14 women professors from 10 different countries to explore to what extent these issues affect women professors in ...
Sarah Mercer +3 more
wiley +1 more source
Deep learning steganography for big data security using squeeze and excitation with inception architectures. [PDF]
Issac BM +4 more
europepmc +1 more source
Abstract This paper examines how Palestinian English teachers (PETs) working at Jewish–Israeli schools navigate trauma in an educational space that both requires and negates them. Driven by labor market demands rather than efforts at educational integration, PETs operate under constant affective and political tension, forced to comply with colonial ...
Muzna Awayed‐Bishara
wiley +1 more source
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source
Exploration of new wildlife surveying methodologies that leverage advances in sensor technology and machine learning has led to tentative research into the application of seismology techniques. This, most commonly, involves the deployment of a footfall trap – a seismic sensor and data logger customised for wildlife footfall.
Benjamin J. Blackledge +4 more
wiley +1 more source

