Understanding the Temperature Conditions for Controlled Splicing Between Silica and Fluoride Fibers
Thermal splicing conditions are investigated between silica and ZrF4 fibers, focusing on mechanical strength. A fiber Bragg grating characterises the thermal profile in the filament splicer's hot zone. Results indicate a narrow temperature window for strong joints.
Antreas Theodosiou+7 more
wiley +1 more source
Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal+2 more
doaj +1 more source
Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3
Frequency domain processing and Inceptionv3 method is used in this article for digital image watermarking of medical images. The algorithm extracts feature vectors from medical images using discrete wavelet transform and discrete cosine transform, enhancing the robustness of the image watermark With the widespread use of digital medical images in ...
Yu Fan+4 more
wiley +1 more source
Cannabinoid therapeutics in orofacial pain management: a systematic review
Abstract The objective of this paper was to investigate the published evidence regarding effects of cannabinoids (natural and synthetic) on post‐operative and/or out‐of‐office pain management in patients suffering from orofacial pain that presents in the dental setting.
C Votrubec+6 more
wiley +1 more source
Phenobot: An Autodigital Modeling System for in situ Phenotyping in Horticulture
This study introduces a robotic phenotyping system for precision agriculture, integrating environmental understanding, motion planning, and in situ plant phenotyping. The system autonomously navigates through real‐world agricultural environments, collects high‐quality plant data, and reconstructs accurate 3D plant models. Results demonstrate the system'
Kewei Hu+5 more
wiley +1 more source
Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source
summarizing data for secure transaction a hash algorithm [PDF]
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire +2 more sources
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection [PDF]
An adversary who has obtained the cryptographic hash of a user's password can mount an offline attack to crack the password by comparing this hash value with the cryptographic hashes of likely password guesses. This offline attacker is limited only by the resources he is willing to invest to crack the password.
Jeremiah Blocki, Anupam Datta
openaire +3 more sources
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez+2 more
wiley +1 more source