Results 61 to 70 of about 12,815 (252)

Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android

open access: yesJurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems), 2015
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi   +2 more
doaj   +1 more source

SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark‐Based Grid Environment

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran   +1 more
wiley   +1 more source

IS COMMON CAROTID INTIMA MEDIA THICKNESS AN INDEPENDENT PREDICTOR FOR CORONARY ARTERY DISEASE

open access: yesARYA Atherosclerosis, 2010
Introduction: Non-invasive measurement of carotid intima media thickness (IMT) has been noted as a marker for atherosclerosis and can serve as a predictor of cardiovascular accidents.
Masoume Sadeghi   +4 more
doaj  

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512

open access: yesJournal of Physics: Conference Series, 2019
This study compares different hashing encryption algorithms and provides several suggestions about how to choose different hashing encryption algorithms for particular cases. This paper presents three different kinds of hashing encryption algorithms. The
Sihan Long
semanticscholar   +1 more source

Analysis of Damping Characteristics in Wind Turbine‐Energy Storage Hybrid Systems Based on Path Module

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
In this paper, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine‐storage storage integrated systems, focusing on the damping path analysis with the phase‐locked loop (PLL) as the oscillation mode.
Shanshan Cheng   +6 more
wiley   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2016
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a
Nithya Chidambaram   +3 more
doaj   +1 more source

Targeting depletion of myeloid-derived suppressor cells potentiates PD-L1 blockade efficacy in gastric and colon cancers

open access: yesOncoImmunology, 2022
Myeloid-derived suppressor cells (MDSCs) have been demonstrated to suppress antitumor immunity and induce resistance to PD-1/PD-L1 blockade immunotherapy in gastric and colon cancer patients.
Yao Tang   +8 more
doaj   +1 more source

Finding Hash Collisions Efficiently in MD5

open access: yes, 2023
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire   +1 more source

Home - About - Disclaimer - Privacy