Results 41 to 50 of about 46,179 (288)

The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims

open access: yesWaraqat: Jurnal Ilmu-Ilmu Keislaman, 2022
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj   +1 more source

Implementation of high-speed SHA-1 architecture

open access: yesIEICE Electronics Express, 2009
This paper proposes a new SHA-1 architecture to exploit higher parallelism and to shorten the critical path for Hash operations. It enhances a performance without significant area penalty. We implemented the proposed SHA-1 architecture on FPGA that showed the maximum clock frequency of 118MHz allows a data throughput rate of 5.9Gbps.
Eun-Hee Lee   +3 more
openaire   +2 more sources

Deploying a New Hash Algorithm [PDF]

open access: yes, 2005
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away from those now, it is clear that it will be necessary to do so in the not-too ...
Bellovin, Steven Michael   +1 more
core   +4 more sources

PASTA‐ELN: Simplifying Research Data Management for Experimental Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
Research data management faces ongoing hurdles as many ELNs remain complex and restrictive. PASTA‐ELN offers an open‐source, cross‐platform solution that prioritizes simplicity, offline access, and user control. Its in tuitive folder structure, modular Python add‐ons, and open formats enable seamless documentation, FAIR data practices, and easy ...
S. Brinckmann, G. Winkens, R. Schwaiger
wiley   +1 more source

Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2018
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh   +2 more
doaj   +1 more source

Poly(lactic‐co‐glycolic acid) Nanoparticles for IL‐12 Self‐Amplifying RNA Delivery in Glioblastoma Models

open access: yesAdvanced Functional Materials, EarlyView.
xxxx. ABSTRACT Glioblastoma (GBM) remains one of the most lethal brain cancers, with median survival rarely exceeding 15 months after diagnosis. Interleukin‐12 (IL‐12) is a potent immunostimulatory cytokine capable of reshaping the tumor microenvironment (TME), yet its clinical translation is hindered by systemic toxicity and short half‐life. RNA‐based
Fatima Hameedat   +11 more
wiley   +1 more source

Digital Signature dengan Algoritma Sha-1 dan Rsa sebagai Autentikasi [PDF]

open access: yes, 2018
Untuk meningkatkan daya saing tenaga kerja Indonesia dengan tenaga kerja asing, pada era MEA saat ini diberlakukan Surat Keterangan Pendamping Ijazah (SKPI) di seluruh Institusi Perguruan Tinggi di Indonesia.
Atika, P. D. (Prima)   +1 more
core  

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

Flexoelectrically Induced Polar Topology in Twisted SrTiO3 Membranes

open access: yesAdvanced Materials, EarlyView.
Twisted SrTiO3 bilayers host polar vortices of flexoelectric origin, revealed through combined experiment and theory. By reconstructing polarization from the toroidal moment of strain gradients, the work establishes a 3D chiral state with broken inversion and mirror symmetries.
Isabel Tenreiro   +13 more
wiley   +1 more source

Finding SHA-1 Characteristics: General Results and Applications [PDF]

open access: yes, 2006
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way.
Christophe De Cannière   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy