Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method. [PDF]
Hamad S, Rashid OF, Al-Dabbas HM.
europepmc +1 more source
Dried biofluid droplet morphologies for automated and scalable disease classification
For the first time, disease‐specific fingerprints of diabetes and influenza are revealed from dried biofluid droplet morphologies. Using automated droplet detection, texture analysis, and interpretable machine learning, this scalable workflow transforms endpoint droplet patterns into diagnostic biomarkers for point‐of‐care healthcare applications ...
Anusuya Pal +5 more
wiley +1 more source
Seismic analysis and design of tunnels within fault ground: A review
The research methods of seismic response of tunnels within fault ground, including field investigations, analytical solutions, physical experiments, and numerical simulations, and seismic countermeasures are discussed. The present study examines the shortcomings and limitations of the current research and design, and puts forward proposals for future ...
Xingda Wang +6 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
A hybrid Fuzzy–SVM framework for real‐time dust detection and thermal mapping in PV panels. ABSTRACT Dust accumulation significantly degrades the energy output of photovoltaic (PV) panels, particularly in arid and semi‐arid regions. While existing studies have separately explored image‐based dust detection, environmental modeling, and machine learning (
Debasish Sarker +4 more
wiley +1 more source
A triple-layer authentication framework with elliptic curve cryptography for securing IoT-assisted wireless sensor networks. [PDF]
Alanazi MD.
europepmc +1 more source
Robust Control Using a Matrix Converter to Enhance Wind Turbine Systems
This study uses a more efficient and effective solution to improve the operational performance of a wind turbine‐based power system. This system uses a doubly fed induction generator and relies on a matrix converter and fractional‐order proportional–integral controller.
Sihem Ghoudelbourk +4 more
wiley +1 more source
A lightweight cryptographic algorithm incorporating path coloring of cartesian product of graphs. [PDF]
Shivapriya P, Meera KN, Lin Y.
europepmc +1 more source
Real‐time quality and safety monitoring of fruit juice using paper‐based platform
Schematic illustration of a paper‐based biosensor for rapid detection of fruit juice spoilage. Abstract Food spoilage and safety concerns still remain critically challenging within the fruit juice industry, especially as conventional detection methods, though precise, are often too time‐consuming, costly, and reliant on centralized laboratories.
Priti Das +4 more
wiley +1 more source
Performance Evaluation of ChaosFortress Lightweight Cryptographic Algorithm for Data Security in Water and Other Utility Management. [PDF]
Raphael R +3 more
europepmc +1 more source

