Results 61 to 70 of about 877,768 (275)

Exosome Proteomics of SOD1D90A Mutation Suggest Early Disease Mechanisms, and FN1 as a Biomarker

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Amyotrophic lateral sclerosis (ALS) is a neuromuscular disease. Super oxide dismutase 1 (SOD1) gene mutations cause ALS, and the D90A mutation is associated with primarily upper motor neuron (UMN) loss. Objective Our goal is to reveal the early cellular events in ALS pathology and identify potential pharmacokinetic biomarkers, using well ...
Mukesh Gautam   +6 more
wiley   +1 more source

Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices

open access: yes2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019
The Internet of Things (IoT) systems are vulnerable to many security threats that may have drastic impacts. Existing cryptographic solutions do not cater for the limitations of resource-constrained IoT devices, nor for real-time requirements of some IoT ...
Hassan N. Noura   +3 more
semanticscholar   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Towards Low Energy Stream Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik   +7 more
doaj   +1 more source

SUATU ALGORITMA KRIPTOGRAFI STREAM CIPHER BERDASARKAN FUNGSI CHAOS [PDF]

open access: yes, 2012
Salah satu sifat fungsi chaos adalah sensitif terhadap nilai awal, artinya perubahan kecil pada nilai awal akan mengakibatkan perubahan besar pada nilai fungsi selanjutnya.
Dwi, Lestari, Muhamad Zaki, Riyanto
core  

Laser Metal Deposited Ti4822 Hollow Pipe: Experimental and Computational Modelling Study

open access: yesAdvanced Engineering Materials, EarlyView.
Laser metal deposition (LMD) of a crack‐free built Ti4822 alloys is challenging. This article reports outstanding characteristics of a hollow pipe that is built with LMD technology when a predicted, nontransformation substrate temperature of 800 °C is used.
Sadiq A. Raji   +5 more
wiley   +1 more source

Fabrication‐Directed Entanglement for Designing Chiral and Anisotropic Metamaterial Foams

open access: yesAdvanced Engineering Materials, EarlyView.
This work introduces fabrication‐directed entanglement (FDE), combining viscous thread printing and topology optimization to program entangled foams with spatially patterned stiffness. By tuning coil density, FDE enables anisotropy, programmable Poisson's ratio, and chirality in foams.
Daniel Revier   +3 more
wiley   +1 more source

Enabling Digital Continuity in Virtual Manufacturing for Eco‐Efficiency Assessment of Lightweight Structures by Means of a Domain‐Specific Structural Mechanics Language: Requirements, Idea and Proof of Concept

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel   +3 more
wiley   +1 more source

SDN security control and forwarding method based on cipher identification

open access: yesTongxin xuebao, 2018
Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher ...
Xi QIN, Guodong TANG, Chaowen CHANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy