Results 101 to 110 of about 46,179 (288)
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
Securing the Internet of Things Infrastructure - Standards and Techniques [PDF]
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users.
Baig, Zubair A
core +1 more source
ABSTRACT This research aims to explore the effects of agricultural productivity and the use of renewable energy sources on India's CO2 emissions while taking economic expansion into concern based on data during 1985–2022. This study applies the autoregressive distributed lag (ARDL) technique, dynamic‐ordinary least square (DOLS), fully‐modified ...
Palanisamy Manigandan +4 more
wiley +1 more source
Serine protease autotransporters of Enterobacteriaceae (SPATEs) are secreted proteins that contribute to virulence and function as proteases, toxins, adhesins, and/or immunomodulators. An extra-intestinal pathogenic E.
Hajer Habouria +9 more
doaj +1 more source
ABSTRACT This study investigates how a Chinese higher vocational college can align skills training with the inheritance and innovative development of fine traditional Chinese culture. Grounded in perspectives that view vocational education as cultural transmission and identity work and informed by the lenses of general‐vocational integration and ...
Yuchang Xu +7 more
wiley +1 more source
ABSTRACT Currently, small‐molecular‐weight collagen peptides are a research hotspot in functional factor development due to their high bioavailability and diverse bioactivities. In this study, gelatin was extracted from tilapia (Oreochromis niloticus) scales by hot water extraction, followed by pepsin hydrolysis and ultrafiltration to obtain the < 3 ...
Ya‐ru Liu +5 more
wiley +1 more source
Tall fescue produces more biomass and less carbon dioxide from the soil when it contains its beneficial fungal endophyte. Increased temperatures projected with climate change reduce fescue biomass, while altered rainfall frequency does not. Altering rainfall frequency and increasing temperatures can reduce carbon dioxide emissions from soil.
Rebecca K. McGrail +4 more
wiley +1 more source
Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until recently, SHA-1 was considered to be the most secure hashing algorithm and also remains the most widely used hashing function till date. In this paper, we review various collision search attacks on the original full 80-step SHA-1 algorithm and present a ...
openaire +1 more source
This prospective study investigated the feasibility of stabilised hyaluronic acid gel as a rectal spacer in gynaecological cancer brachytherapy. In twelve patients, the spacer was successfully inserted into the rectovaginal space without serious adverse events, had high visibility on MRI, increased the target‐to‐rectum distance compared with no spacer ...
Carminia Lapuz +8 more
wiley +1 more source

