Results 121 to 130 of about 153,790 (328)
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim +6 more
doaj +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj +1 more source
A Digital Phantom for MR Spectroscopy Data Simulation
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande +11 more
wiley +1 more source
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho +3 more
doaj +1 more source
Abstract Process information collected from educational games can illuminate how students approach interactive tasks, complementing assessment outcomes routinely examined in evaluation studies. However, the two sources of information are historically analyzed and interpreted separately, and diagnostic process information is often underused.
Tianying Feng, Li Cai
wiley +1 more source
Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj +1 more source
LDPC and SHA based iris recognition for image authentication
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj +1 more source
Abstract Purpose The purpose of this study was to compare the accuracy, calibration, reproducibility and operating cost of seven large language models (LLMs)—including four newer models capable of using advanced reasoning techniques to analyse complex medical information and generate accurate responses—on text‐only orthopaedic multiple‐choice questions
Pedro Diniz +5 more
wiley +1 more source

