Results 81 to 90 of about 142,210 (279)
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez+2 more
wiley +1 more source
Securing and transmitting data through images without being hacked is important in stegnography. Identification of the hidden data without the knowledge of appropriate algorithm is beyond bounds.
K. Dhanasekaran, P. Anandan, A. Manju
semanticscholar +1 more source
Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA [PDF]
Department Of Electrical EngineeringIn this paper, we implement the IEEE 1609.2 secure vehicle communication (VC) standard using FPGA by fast and efficient ways. Nowadays, smart vehicle get nearer to our everyday life.
Jeong, Chanbok
core
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng+4 more
wiley +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos+10 more
wiley +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah+2 more
doaj +2 more sources
Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj +1 more source
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira+4 more
wiley +1 more source
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source