Results 81 to 90 of about 507,576 (358)
Quantum Key Distribution for V2I communications with software‐defined networking
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas +9 more
doaj +1 more source
Survey on SAP and its application in public-key cryptography
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
Current trends in single‐cell RNA sequencing applications in diabetes mellitus
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian +6 more
wiley +1 more source
Combinatorial group theory and public key cryptography
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core +2 more sources
Some cryptographic algorithms [PDF]
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core
This study presents a novel approach to teaching Python and bioinformatics using team‐based learning and cloud‐hosted notebooks. By integrating interactive coding into biomedical education, the method improves accessibility, student engagement, and confidence—especially for those without a computing background.
Nuno S. Osório, Leonardo D. Garma
wiley +1 more source
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core
Microbial profile of the appendix niche in acute appendicitis: a novel sampling approach
This study utilized a novel sampling method, ERAT (i.e. endoscopic retrograde appendicitis treatment)‐guided lumen aspiration, to obtain samples from the appendix, and shotgun metagenomic sequencing was performed for in situ characterization of the appendix microbiome in patients with acute appendicitis.
Huimin Ma +10 more
wiley +1 more source

