Results 41 to 50 of about 166,374 (227)

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +1 more source

Combining Three Peripheral Blood Biomarkers to Stratify Rheumatoid Arthritis‐Associated Interstitial Lung Disease Risk

open access: yesArthritis Care &Research, Accepted Article.
Objective The purpose was to evaluate a biomarker score consisting of MUC5B rs35705950 promoter variant, plasma matrix metalloproteinase (MMP)‐7, and serum anti‐malondialdehyde‐acetaldehyde (anti‐MAA) antibody for RA‐associated interstitial lung disease risk stratification. Methods Using a multicenter cohort of US veterans with RA, we performed a cross‐
Kelsey Coziahr   +16 more
wiley   +1 more source

A quadruplex real-time PCR assay combined with a conventional PCR for the differential detection of Marek’s disease virus vaccines and field strains

open access: yesFrontiers in Veterinary Science, 2023
To evaluate the effect of the vaccine and differentiate vaccine from virulent MDV, a new quadruplex real-time PCR assay based on TaqMan probes was developed to differentiate and accurately quantify HVT, CVI988 and virulent MDV-1.
Shaopeng Wu   +17 more
doaj   +1 more source

Partitioning the vertex set of $G$ to make $G\,\Box\, H$ an efficient open domination graph

open access: yes, 2016
A graph is an efficient open domination graph if there exists a subset of vertices whose open neighborhoods partition its vertex set. We characterize those graphs $G$ for which the Cartesian product $G \Box H$ is an efficient open domination graph when ...
Peterin, Iztok   +3 more
core   +1 more source

How to Break EAP-MD5 [PDF]

open access: yes, 2012
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which ...
Liu, Fanbao, Xie, Tao
openaire   +1 more source

Quantum‐Grade Nanodiamonds from a Single‐Step, Industrial‐Scale Pressure and Temperature Process

open access: yesAdvanced Functional Materials, EarlyView.
Novel method for creation of nitrogen‐vacancy centers in 50‐nm nanodiamonds based on high‐temperature plastic deformation is demonstrated. Compared to the electron irradiation approach, it yields nitrogen‐vacancy centers with significantly improved charge stability, T1 relaxation time, and optical Rabi contrast.
Yahua Bao   +17 more
wiley   +1 more source

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

Micro computed tomography based finite element models of calcium phosphate scaffolds for bone tissue engineering [PDF]

open access: yes, 2016
Bone is a living tissue that is able to regenerate by itself. However, when severe bone defects occur, the natural regeneration may be impaired. In these cases, bone graft substitutes can be used to induce the natural healing process.
Jung, Timo Karl
core  

Biomarkers of Lupus Nephritis Histopathology: Where Do We Stand?

open access: yesArthritis &Rheumatology, Accepted Article.
Objective Lupus nephritis (LN) is characterized by a variable disease course, necessitating continuous monitoring. There is an urgent need to identify non‐invasive biomarkers. By reviewing and critically assessing the quality of existing studies on LN biomarkers correlating with histopathology, we here explore the challenges in promoting their use in ...
Valentina Querin   +11 more
wiley   +1 more source

Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android

open access: yesJurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems), 2015
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy