Results 121 to 130 of about 153,790 (328)

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2

open access: yesWasit Journal of Engineering Sciences
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj   +1 more source

A Digital Phantom for MR Spectroscopy Data Simulation

open access: yesMagnetic Resonance in Medicine, Volume 95, Issue 3, Page 1345-1359, March 2026.
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande   +11 more
wiley   +1 more source

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +1 more source

Sensemaking of Process Data from Evaluation Studies of Educational Games: An Application of Cross‐Classified Item Response Theory Modeling

open access: yesJournal of Educational Measurement, Volume 63, Issue 1, Spring 2026.
Abstract Process information collected from educational games can illuminate how students approach interactive tasks, complementing assessment outcomes routinely examined in evaluation studies. However, the two sources of information are historically analyzed and interpreted separately, and diagnostic process information is often underused.
Tianying Feng, Li Cai
wiley   +1 more source

Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding

open access: yesJournal of Intelligent Systems, 2018
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj   +1 more source

LDPC and SHA based iris recognition for image authentication

open access: yesEgyptian Informatics Journal, 2012
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj   +1 more source

Reasoning‐optimised large language models reach near‐expert accuracy on board‐style orthopaedic exams: A multi‐model comparison on 702 multiple‐choice questions

open access: yesKnee Surgery, Sports Traumatology, Arthroscopy, Volume 34, Issue 2, Page 752-762, February 2026.
Abstract Purpose The purpose of this study was to compare the accuracy, calibration, reproducibility and operating cost of seven large language models (LLMs)—including four newer models capable of using advanced reasoning techniques to analyse complex medical information and generate accurate responses—on text‐only orthopaedic multiple‐choice questions
Pedro Diniz   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy