Results 91 to 100 of about 147,726 (298)
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl +2 more
wiley +1 more source
Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm [PDF]
Ratan Kumar Basak +3 more
openalex +2 more sources
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources
Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj +1 more source
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding [PDF]
We propose a secure scheme for wireless network coding, called the algebraic watchdog. By enabling nodes to detect malicious behaviors probabilistically and use overheard messages to police their downstream neighbors locally, the algebraic watchdog ...
Barros, Joao, Kim, MinJi, Medard, Muriel
core +2 more sources
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez +2 more
wiley +1 more source
Alternating‐contrast single‐shot spiral MR‐ARFI with model‐based displacement map reconstruction
Abstract Purpose To improve single‐shot spiral MR‐Acoustic Radiation Force Imaging (MR‐ARFI)'s robustness to dynamic phase errors and evaluate it in non‐human primates (NHPs) with a low‐f‐number transducer. Methods A single‐shot spiral MR‐ARFI pulse sequence with 2 mm in‐plane resolution and alternating displacement phase contrast was implemented to ...
Saikat Sengupta +4 more
wiley +1 more source
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq +2 more
doaj +1 more source
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung +2 more
doaj +1 more source
A Digital Phantom for MR Spectroscopy Data Simulation
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande +11 more
wiley +1 more source

