Results 81 to 90 of about 142,210 (279)

A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research

open access: yesInternational Journal of Cancer, EarlyView.
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez   +2 more
wiley   +1 more source

A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm

open access: yes, 2018
Securing and transmitting data through images without being hacked is important in stegnography. Identification of the hidden data without the knowledge of appropriate algorithm is beyond bounds.
K. Dhanasekaran, P. Anandan, A. Manju
semanticscholar   +1 more source

Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA [PDF]

open access: yes, 2015
Department Of Electrical EngineeringIn this paper, we implement the IEEE 1609.2 secure vehicle communication (VC) standard using FPGA by fast and efficient ways. Nowadays, smart vehicle get nearer to our everyday life.
Jeong, Chanbok
core  

De Novo Whole Genome Assemblies of Unusual Case‐Making Caddisflies (Trichoptera) Highlight Genomic Convergence in the Composition of the Major Silk Gene (h‐fibroin)

open access: yesJournal of Experimental Zoology Part B: Molecular and Developmental Evolution, EarlyView.
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng   +4 more
wiley   +1 more source

pTx‐Pulseq in hybrid sequences: Accessible and advanced hybrid open‐source MRI sequences on Philips scanners

open access: yesMagnetic Resonance in Medicine, EarlyView.
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos   +10 more
wiley   +1 more source

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication

open access: yesIEEE Access, 2020
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Exact Methods for the Split Delivery Vehicle Routing Problem With Two‐Dimensional Loading Constraints

open access: yesNetworks, EarlyView.
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira   +4 more
wiley   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Home - About - Disclaimer - Privacy