Results 181 to 190 of about 224,759 (272)
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Abstract This paper examines how Palestinian English teachers (PETs) working at Jewish–Israeli schools navigate trauma in an educational space that both requires and negates them. Driven by labor market demands rather than efforts at educational integration, PETs operate under constant affective and political tension, forced to comply with colonial ...
Muzna Awayed‐Bishara
wiley +1 more source
Design of a multi-layered privacy-preserving architecture for secure medical data exchange in cloud environments. [PDF]
Muthuvel S, Priya S, Sampath Kumar K.
europepmc +1 more source
Exploration of new wildlife surveying methodologies that leverage advances in sensor technology and machine learning has led to tentative research into the application of seismology techniques. This, most commonly, involves the deployment of a footfall trap – a seismic sensor and data logger customised for wildlife footfall.
Benjamin J. Blackledge +4 more
wiley +1 more source
Reversible data hiding for electronic patient information security for telemedicine applications. [PDF]
Muhudin A +3 more
europepmc +1 more source
With a Great Story Comes Great Responsibility: Role of Narrative in Leadership Development
ABSTRACT Comic books reside uniquely within American culture. Historians have contended comics are more than just sequential artwork mixed with engaging stories, but rather, a framework by which the generations make sense of who they are. These stories are a reflection of cultural conscience; a lens through which we can view the world and a mirror ...
Sean Connable
wiley +1 more source
Hybrid Vigenere and elliptic curve cryptography technique over the finite field [Formula: see text]. [PDF]
El Bourakkadi H +5 more
europepmc +1 more source
ABSTRACT Hip‐hop music and culture have existed for decades in the United States. Since the 1970s, five critical elements have been defined as parts of hip‐hop culture: the MC (oral), the DJ (aural), graffiti (visual), knowledge (mental), and breakdancing (physical).
Jesse R. Ford +2 more
wiley +1 more source
Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method. [PDF]
Hamad S, Rashid OF, Al-Dabbas HM.
europepmc +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source

