Results 71 to 80 of about 13,790 (198)

SHA-256 Hash Function on Intel DE10 Lite FPGA

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2023
Abstract: The SHA-256 hash function is a standardized and trusted algorithm that takes a set of data and produces a unique, deterministic, and irreversible representation called a hash or digest. A component of other protocols, SHA-256 protects password storage, secures and verifies Bitcoin transactions, and authenticates internet communication. We did
Michael DiNardi, Damu Radhakrishnan
openaire   +1 more source

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

Analysis and implementation of cryptographic hash functions in programmable logic devices / Kriptografinių maišos funkcijų įgyvendinimo programuojamosios logikos lustuose tyrimas

open access: yesMokslas: Lietuvos Ateitis, 2016
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj   +1 more source

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Atypical cortical neural activity in internet gaming disorder comorbid with autism spectrum disorder during a cue reactivity task: A magnetoencephalography study

open access: yesPsychiatry and Clinical Neurosciences Reports, Volume 5, Issue 1, March 2026.
Abstract Aim Significant, positive correlations between internet gaming disorder (IGD) and autism spectrum disorder (ASD) are known. Individuals with ASD are prone to problematic internet use due to addiction or restricted interests. Here, we examined cortical neural activity in individuals with IGD comorbid with ASD during a gaming‐related cue ...
Faisal Budisasmita Paturungi Parawansa   +11 more
wiley   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Trustworthy Federated Learning for Industrial IoT: Balancing Robustness and Fairness via Blockchain‐Based Reputation

open access: yesArtificial Intelligence for Engineering, Volume 2, Issue 1, Page 67-77, March 2026.
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley   +1 more source

Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner

open access: yesResolusi : Rekayasa Teknik Informatika dan Informasi, 2022
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new.
openaire   +1 more source

Phenomenal knowledge and phenomenal causality

open access: yesNoûs, Volume 60, Issue 1, Page 212-232, March 2026.
Abstract There has been extensive debate over whether we can have phenomenal knowledge in the case of epiphenomenalism. This article aims to bring that debate to a close. I first develop a refined causal account of knowledge—one that is modest enough to avoid various putative problems, yet sufficiently robust to undermine the epiphenomenalist position.
Lei Zhong
wiley   +1 more source

Blockchain Security Using Confidentiality, Integrity, and Availability for Secure Communication

open access: yesBlockchains
Background: Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool ...
Chukwuebuka Francis Ikenga-Metuh   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy