Results 151 to 160 of about 147,726 (298)
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Summary: This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object.
Zhiyu Xie +3 more
doaj +1 more source
Secure Hash Algorithm SHA-3 [PDF]
openaire +2 more sources
ABSTRACT A key application of phylogenetics in ecological studies is identifying unknown sequences with respect to known ones. This goal can be formalised as assigning taxonomic labels or inserting sequences into a reference phylogenetic tree (phylogenetic placement). Much attention has been paid to the phylogenetic placement of short fragments used in
Eleonora Rachtman +2 more
wiley +1 more source
Summary The assembly of plant mitochondrial genomes presents unique challenges due to difficulties in isolating mitochondrial DNA (mtDNA) and plant mitochondrial genome characteristics, such as low interspecific conservation; sequence sharing among mitochondrial, nuclear and plastid DNAs; and complex structural variations.
Yang Ni +4 more
wiley +1 more source
EMBEDDING DATA HASHING ALGORITHMS INTO A CRYPTOGRAPHIC INFORMATION SECURITY TOOL
"Science and innovation" international scientific journal.
openaire +1 more source
Addressing the Fairness Issue of Large Music Models: A Blockchain Approach
ABSTRACT With the rapid development of AI, the integration of intelligent techniques into music has been booming rapidly in recent years. However, there is a rising concern about the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI‐generated music.
Qinyuan Wang +3 more
wiley +1 more source
Abstract El Niño‐Southern Oscillation (ENSO) and Madden‐Julian Oscillation (MJO) are two major modes of climate variability with global hydroclimate impacts. However, their impacts often depend on the local climate and geography, resulting in large regional differences.
Xiaodong Chen, L. Ruby Leung, Ning Sun
wiley +1 more source
APPLICATION OF THE SECURE HASHING ALGORITHM (SHA) METHOD AND ROLE-BASED ACCESS SECURITY AUTHENTICATION IN LARAVEL 7 [PDF]
Thomson Mary +2 more
openalex +1 more source

