Results 71 to 80 of about 12,815 (252)
Abstract The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications.
Shitharth Selvarajan+5 more
wiley +1 more source
Development of One‐Part Alkali‐Activated Mortar Using Foundry Waste Sand
Foundry waste sand (FWS) refers to sand that is no longer useful after being utilized in metal casting processes. This sand is produced at a rate of around 0.6 tons per 1 ton of foundry industry manufactured and is typically discarded in landfills. To provide a sustainable solid waste management solution and reuse of the FWS, a study was conducted to ...
Manoj Wankhede+2 more
wiley +1 more source
A New Image Encryption Method Using an Optimized Smart Codebook
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method called the smart codebook, which combines an intelligent codebook technique with the RSA (Rivest ...
Rami Sihwail+2 more
wiley +1 more source
The Geometry of K-Orbits of a Subclass of MD5-Groups and Foliations Formed by their Generic K-Orbits [PDF]
The present paper is a continuation of Le Anh Vu's ones [13], [14], [15]. Specifically, the paper is concerned with the subclass of connected and simply connected MD5-groups such that their MD5-algebras $\mathcal{G}$ have the derived ideal ${\mathcal{G}}^{1} : = [ \mathcal{G},\mathcal{G} ]\equiv$ ${\bf{R}}^{3}$.
arxiv
Innovative Hardware Accelerator Architecture for FPGA‐Based General‐Purpose RISC Microprocessors
Reconfigurable computing (RC) theory aims to take advantage of the flexibility of general‐purpose processors (GPPs) alongside the performance of application specific integrated circuits (ASICs). Numerous RC architectures have been proposed since the 1960s, but all are struggling to become mainstream.
Ehsan Ali, Iouliia Skliarova
wiley +1 more source
Endogenous Cu(II) Labeling for Distance Measurements on Proteins by EPR
Quick and easy endogenous spin labeling: This work shows that hypotonic swelling is a reproducible and facile method to endogenously label proteins with Cu(II) protein spin label in E. coli cells. The method enables the facile measurement of structural constraints in‐cells. The figure was made using BioRender.com.
Hannah R. Hunter+3 more
wiley +1 more source
K-theory for the Leaf Space of Foliations Formed by the Generic K-orbits of a class of Solvable Real Lie Groups [PDF]
The paper is a continuation of the works [17] of Vu and Shum, [18] and [19] of Vu and Hoa. In [17], Vu and Shum classified all the MD5-algebras having commutative derived ideals. In [18], Vu and Hoa considered foliations formed by the maximal dimensional K-orbits (for short, MD5-foliations) of connected MD5-groups such that their Lie algebras have 4 ...
arxiv
The EasyAmplicon pipeline workflow for amplicon sequencing analysis begins with sample collection and next‐generation sequencing, which generates sequencing data alongside crucial metadata for contextual understanding. This user‐friendly pipeline is compatible with Windows, Linux, and macOS, offering both command‐line and interactive modes in RStudio ...
Salsabeel Yousuf+38 more
wiley +1 more source
Wpływ zastosowania programowania równoległego na wydajność algorytmów kryptograficznych
W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5.
Mateusz Kraska, Piotr Kozieł
doaj +1 more source
On a Subclass of 5-Dimensional Solvable Lie Algebras Which Have 3-Dimensional Commutative Derived Ideal [PDF]
The paper presents a subclass of the class of MD5-algebras and MD5-groups, i.e., five dimensional solvable Lie algebras and Lie groups such that their orbits in the co-adjoint representation (K-orbit) are orbit of zero or maximal dimension. The main results of the paper is the classification up to an isomorphism of all MD5-algebras $\mathcal{G}$ with ...
arxiv