Results 61 to 70 of about 13,790 (198)

Secure Communications using Nonlinear Silicon Photonic Keys

open access: yes, 2018
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T.   +5 more
core   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

A Sequence‐to‐Sequence Approach for Short‐Term Temperature Prediction With Data Decomposition and Reconstruction

open access: yesNatural Resource Modeling, Volume 39, Issue 2, May 2026.
ABSTRACT Temperature is an important factor affecting daily life, and accurate multi‐step temperature prediction can provide essential support for weather prediction, energy management, agricultural planning, and disaster mitigation. However, as the prediction horizon extends, the nonlinear nature of temperature data becomes more prominent, making it ...
Baohe Liu   +4 more
wiley   +1 more source

Implementing TontineCoin [PDF]

open access: yes, 2020
One of the alternatives to proof-of-work (PoW) consensus protocols is proof-of- stake (PoS) protocols, which address its energy and cost related issues. But they suffer from the nothing-at-stake problem; validators (PoS miners) are bound to lose nothing ...
Pardeshi, Prashant
core   +1 more source

Phytochemical Diversity, Nutritional Values, and Biological Properties of Halopithys incurva (Hudson) Batters, 1902

open access: yesFood Science &Nutrition, Volume 14, Issue 4, April 2026.
Halopithys incurva is a red macroalga distributed across the Mediterranean Sea and North‐East Atlantic, with occasional reports from the Indian Ocean. It exhibits a rich chemical diversity, including isoflavones, bromophenols, MAAs, pigments, phycobiliproteins, primary metabolites, and neuroactive compounds.
Youssra Aalilou   +9 more
wiley   +1 more source

Hybrid Techniques for Shared File Security in Cloud Environment Using SHA-256

open access: yesCybernetics and Information Technologies
This research examines file protection in cloud environments using the SHA-256 algorithm. It evaluates secure hash variants in file transfer systems, aiming to improve throughput while meeting security requirements.
AlKhazaleh Alaa   +5 more
doaj   +1 more source

The Prevalence of Computer Vision Syndrome Among Medical Students in Syria: A National Cross‐Sectional Study

open access: yesHealth Science Reports, Volume 9, Issue 4, April 2026.
ABSTRACT Background and Aims Computer vision syndrome (CVS) is a recognised health concern characterized by eye and vision‐related symptoms resulting from prolonged use of digital devices. Approximately 60 million people worldwide are affected by CVS, with almost one million new cases reported annually.
Hasan Nabil Alhouri   +11 more
wiley   +1 more source

Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA [PDF]

open access: yes, 2015
Department Of Electrical EngineeringIn this paper, we implement the IEEE 1609.2 secure vehicle communication (VC) standard using FPGA by fast and efficient ways. Nowadays, smart vehicle get nearer to our everyday life.
Jeong, Chanbok
core  

Brute Force Attack pada Algoritma SHA-256

open access: yesTalenta Conference Series: Science and Technology (ST), 2019
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan kriptografi dengan cara mencoba seluruh kemungkinan jawaban/kunci yang ada. Secara umum seluruh jenis algoritma kriptografi dapat dipecahkan dengan menggunakan brute force attack, namun dalam pelaksanaannya brute force attack
openaire   +1 more source

Do Just Energy Transition Partnerships collide or converge with substantive investment law standards? Case studies from Indonesia and Vietnam

open access: yesReview of European, Comparative &International Environmental Law, Volume 35, Issue 1, Page 115-141, April 2026.
Abstract Just Energy Transition Partnerships (JETPs) are novel financing mechanisms that encourage coal‐dependent emerging economies to transition away from fossil fuels. JETPs aim to facilitate coal phaseout and transitions to renewable energy through private and public financing.
Francine Hug
wiley   +1 more source

Home - About - Disclaimer - Privacy