Results 1 to 10 of about 1,841,501 (298)
Herbarium Wolnyanum: Botanical collection in Sremski Karlovci Grammar School [PDF]
Herbaria as botanical collections have an interesting historical background. What was considered a traditional old-school field of science in the 20th century has become one of the focal points of interest in new-age science at the beginning of
Rat Milica M.
doaj +1 more source
Pulmonary hypertension (PH) is a chronic and progressive disease. We introduced a novel automated self-organized feature engineering architecture for PH detection, which was trained and refined using a new thoracic CT image dataset.
Tarik Kivrak +8 more
doaj +1 more source
An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives
With the spread of digital images, the security of these data has become a serious problem. In this study, an image encryption algorithm is designed to ensure the confidentiality of digital images. The original aspect of the proposed algorithm is that it
Zahir Muhammad Ziad Muhammad +1 more
doaj +1 more source
A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps
Chaotic systems have been used to generate the substitutional box structures. The existence of endless possibilities for the selection of the initial conditions and control parameters of the chaotic system has made it a necessity to use the optimization ...
Erkan Tanyildizi, Fatih Ozkaynak
doaj +1 more source
In Memoriam Traian Rotariu, profesor universitar emerit (12.02.1943-28.12.2021)
Traian Rotariu, emeritus professor of Sociology at the Babeș-Bolyai University in Cluj, passed away on the 28th of December 2021. He left behind an outstanding oeuvre in sociology, quantitative social research, and demography, as well as a legacy of ...
Cristina Raț
doaj +1 more source
This paper analyzes the expressivity of popular language from the novels ”Iancu Jianu, Head of Administration” and ”Iancu Jianu, Captain of the Hajduks” by N.D. Popescu.
Ileana Manuela Rat
doaj +1 more source
Robust protocols are needed to create a secure computing system. Protocols designed without considering various design criteria result in many vulnerabilities. Security has many aspects.
Zahir Muhammed Ziad Muhammad +1 more
doaj +1 more source
The processes and systems in the real world actually contain order and symmetry. Understanding these order and symmetrical behavior has been a common effort of scientists.
Mehmet Sahin Acikkapi, Fatih Ozkaynak
doaj +1 more source
Simplified Agent-Based Resource Sharing Approach for WSN-WSN Interaction in IoT/CPS Projects
This paper focuses on the problem of interoperability and resource sharing in wireless sensor networks (WSNs) running under the Internet of Things (IoT) and cyber-physical systems (CPSs).
Gungor Yildirim, Yetkin Tatar
doaj +1 more source
On asymptotic statistical equivalence of order of generalised difference sequences [PDF]
We introduce and examine the concepts of asymptotic statistical equivalence of order , and strong asymptotic equivalence of order of sequences. Also, we give some relations connected to these concepts.
Mikail Et +2 more
doaj +1 more source

