Results 51 to 60 of about 58,276 (196)
Introduction While African countries, in general, experienced a milder COVID-19 impact compared to Western nations, they faced challenges with vaccine uptake.
Simon Ssentongo +10 more
doaj +1 more source
VoIP Steganography Methods, a Survey
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj +1 more source
Auto‐Routing Fluidic Printed Circuit Boards
This work introduces (STREAM) software tool for routing efficiently advanced macrofluidics, an open‐source software tool for automating the design of 3D‐printable fluidic circuit boards. STREAM streamlines tube routing and layout, enabling the rapid fabrication of fluidic networks for soft robotics, lab‐on‐a‐chip devices, microfluidics, and biohybrid ...
Savita V. Kendre +3 more
wiley +1 more source
Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding
JUCS - Journal of Universal Computer Science Volume Nr.
Cvejic,Nedeljko, Seppänen,Tapio
openaire +1 more source
The stellar disk thickness of LSB galaxies
We present surface photometry results for a sample of eleven edge-on galaxies observed with the 6m telescope at the Special Astrophysical Observatory (Russia).
Barteldrees A. +15 more
core +1 more source
A targeted metabologenomic strategy integrating genomic and metabolomic hallmarks enabled the discovery of two new thioamides, thiogochangamides A and B, from bacteria. Their absolute configurations, previously unresolved within the thioviridamide family, were fully assigned through various chemical derivatizations and computational analysis ...
Young Eun Du +18 more
wiley +1 more source
Digital Image Watermarking Techniques: A Review
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj +1 more source
An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods
The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods
Qazanfari, Kazem, Safabakhsh, Reza
openaire +2 more sources
We study the vacuum solutions of a gravity model where Lorentz symmetry is spontaneously broken once a vector field acquires a vacuum expectation value. Results are presented for the purely radial Lorentz symmetry breaking (LSB), radial/temporal LSB and ...
C. M. Will +8 more
core +1 more source
On the relation between circular velocity and central velocity dispersion in high and low surface brightness galaxies [PDF]
In order to investigate the correlation between the circular velocity Vc and the central velocity dispersion of the spheroidal component sigma_c, we analyzed these quantities for a sample of 40 high surface brightness disc galaxies (hereafter HSB), 8 ...
A. Pizzella +13 more
core +4 more sources

