Results 61 to 70 of about 12,815 (252)
Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi+2 more
doaj +1 more source
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran+1 more
wiley +1 more source
IS COMMON CAROTID INTIMA MEDIA THICKNESS AN INDEPENDENT PREDICTOR FOR CORONARY ARTERY DISEASE
Introduction: Non-invasive measurement of carotid intima media thickness (IMT) has been noted as a marker for atherosclerosis and can serve as a predictor of cardiovascular accidents.
Masoume Sadeghi+4 more
doaj
Kode Autentikasi Hash pada Pesan Teks Berbasis Android
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj +1 more source
This study compares different hashing encryption algorithms and provides several suggestions about how to choose different hashing encryption algorithms for particular cases. This paper presents three different kinds of hashing encryption algorithms. The
Sihan Long
semanticscholar +1 more source
In this paper, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine‐storage storage integrated systems, focusing on the damping path analysis with the phase‐locked loop (PLL) as the oscillation mode.
Shanshan Cheng+6 more
wiley +1 more source
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia+5 more
wiley +1 more source
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a
Nithya Chidambaram+3 more
doaj +1 more source
Myeloid-derived suppressor cells (MDSCs) have been demonstrated to suppress antitumor immunity and induce resistance to PD-1/PD-L1 blockade immunotherapy in gastric and colon cancer patients.
Yao Tang+8 more
doaj +1 more source
Finding Hash Collisions Efficiently in MD5
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire +1 more source