Results 71 to 80 of about 13,790 (198)
SHA-256 Hash Function on Intel DE10 Lite FPGA
Abstract: The SHA-256 hash function is a standardized and trusted algorithm that takes a set of data and produces a unique, deterministic, and irreversible representation called a hash or digest. A component of other protocols, SHA-256 protects password storage, secures and verifies Bitcoin transactions, and authenticates internet communication. We did
Michael DiNardi, Damu Radhakrishnan
openaire +1 more source
Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley +1 more source
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj +1 more source
Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu +3 more
wiley +1 more source
Abstract Aim Significant, positive correlations between internet gaming disorder (IGD) and autism spectrum disorder (ASD) are known. Individuals with ASD are prone to problematic internet use due to addiction or restricted interests. Here, we examined cortical neural activity in individuals with IGD comorbid with ASD during a gaming‐related cue ...
Faisal Budisasmita Paturungi Parawansa +11 more
wiley +1 more source
XML data integrity based on concatenated hash function [PDF]
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley +1 more source
Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new.
openaire +1 more source
Phenomenal knowledge and phenomenal causality
Abstract There has been extensive debate over whether we can have phenomenal knowledge in the case of epiphenomenalism. This article aims to bring that debate to a close. I first develop a refined causal account of knowledge—one that is modest enough to avoid various putative problems, yet sufficiently robust to undermine the epiphenomenalist position.
Lei Zhong
wiley +1 more source
Blockchain Security Using Confidentiality, Integrity, and Availability for Secure Communication
Background: Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool ...
Chukwuebuka Francis Ikenga-Metuh +1 more
doaj +1 more source

