Results 31 to 40 of about 17,540 (171)

Digging supplementary buried channels: investigating the notch architecture within the CCD pixels on ESA's Gaia satellite [PDF]

open access: yes, 2013
The European Space Agency (ESA) Gaia satellite has 106 CCD image sensors which will suffer from increased charge transfer inefficiency (CTI) as a result of radiation damage.
Brown, A. G. A.   +7 more
core   +2 more sources

Perbandingan performansi pengiriman data antar node wireless sensor menggunakan kriptografi RSA dan RC 4

open access: yesJurnal Eltek
Wireless Sensor Network (WSN) adalah teknologi jaringan nirkabel untuk mengumpulkan dan mengirimkan data, namun rentan terhadap penyadapan sehingga memerlukan pengamanan menggunakan kriptografi. Penelitian ini membandingkan algoritma RSA (asimetris) dan
M. Nanak Zakaria   +2 more
doaj   +1 more source

A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol] [PDF]

open access: yes, 2004
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet in the near future. However, data security and privacy remain major concerns in the current generation of wireless connectivity.
Jagetia, M, Kocak, T
core   +2 more sources

The Rapid Decay property and centroids in groups [PDF]

open access: yes, 2015
This is a survey of methods of proving or disproving the Rapid Decay property in groups. We present a centroid property of group actions on metric spaces. That property is a generalized (and corrected) version of the property (**)-relative hyperbolicity"
Sapir, Mark
core   +1 more source

Engineering stochasticity in gene expression [PDF]

open access: yes, 2008
Stochastic fluctuations (noise) in gene expression can cause members of otherwise genetically identical populations to display drastically different phenotypes. An understanding of the sources of noise and the strategies cells employ to function reliably
Bayer, Travis S.   +4 more
core   +1 more source

On the Reverse Engineering of the Citadel Botnet [PDF]

open access: yes, 2014
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian   +4 more
core   +3 more sources

A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher

open access: yesSensors, 2022
Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed.
Rizk M. Rizk-Allah   +6 more
doaj   +1 more source

Identifying reverse 3PL performance critical success factors [PDF]

open access: yes, 2009
The reverse and third party logistics operational process is now well known and established to be a vital component of modern day supply chain and product / service-based organizations (Marasco, 2007).
Sharif, A M
core  

Validation of the ABL + DT model: An ecosystemic framework for integrating arts and digital technologies in primary education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Primary education teachers face increasing challenges in engaging diverse learners and fostering creativity, digital competence and other transversal skills, often lacking clear, practical guidance for integrating these skills into their classrooms.
Nella Escala   +2 more
wiley   +1 more source

Astronomical constraints on some long-range models of modified gravity [PDF]

open access: yes, 2007
In this paper we use the corrections to the usual Newton-Einstein secular precessions of the perihelia of the inner planets of the Solar System, phenomenologically estimated as solve-for parameters by the Russian astronomer E.V. Pitjeva by fitting almost
Iorio, Lorenzo
core   +3 more sources

Home - About - Disclaimer - Privacy