Results 81 to 90 of about 47,059 (344)

Ontology‐Based Digital Infrastructure for Data‐Driven Glass Development

open access: yesAdvanced Engineering Materials, EarlyView.
This work addresses the inefficiencies in traditional glass development by implementing an ontology‐based digital infrastructure coupled with a high‐throughput robotic melting system. The approach integrates machine learning models, predictive tools, and a semantic database.
Ya‐Fan Chen   +20 more
wiley   +1 more source

Differential fault location identification by machine learning

open access: yesCAAI Transactions on Intelligence Technology, 2021
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacker's power and a ...
Anubhab Baksi   +4 more
doaj   +1 more source

Analysis of Solitaire [PDF]

open access: yesarXiv, 2019
The Solitaire cipher was designed by Bruce Schneier as a plot point in the novel Cryptonomicon by Neal Stephenson. The cipher is intended to fit the archetype of a modern stream cipher whilst being implementable by hand using a standard deck of cards with two jokers.
arxiv  

Environmental Impact Assessment of Copper‐Alloy Production Using Process Simulation and Semantic Modeling

open access: yesAdvanced Engineering Materials, EarlyView.
In the current research, how environmental impacts of products can be tracked through complex production networks using semantic data and environmental impact calculations is demonstrated. Here, the example of secondary copper production and the subsequent production of copper alloys is discussed.
Mohsin Sajjad   +3 more
wiley   +1 more source

Implementasi Multi Enkripsi Algoritma Stream Cipher dan Affine Cipher untuk Pengamanan Data Customer [PDF]

open access: yes
Salah satu cara untuk melindungi data dari berbagai bidang dan tingkatan adalah dengan menggunakan enkripsi, namun seringkali ada masalah seperti lamanya durasi eksekusi dan besarnya sumber daya yang dibutuhkan terutama pada enkripsi yang kuat.
Jaya, Agam, Yuliastuti, Gusti Eka
core   +2 more sources

Stream/block ciphers, difference equations and algebraic attacks [PDF]

open access: yesarXiv, 2020
In this paper we model a class of stream and block ciphers as systems of (ordinary) explicit difference equations over a finite field. We call this class "difference ciphers" and we show that ciphers of application interest, as for example systems of LFSRs with a combiner, Trivium and Keeloq, belong to the class.
arxiv  

Non‐Destructive and Mechanical Characterization of the Bond Quality of Co‐Extruded Titanium‐Aluminum Profiles

open access: yesAdvanced Engineering Materials, EarlyView.
This study investigates the bond quality of co‐extruded aluminum–titanium hybrid profiles, focusing on the lateral angular co‐extrusion (LACE) process. It examines how heat treatments (HT) affect intermetallic phase formation, bond strength, and material properties.
Norman Mohnfeld   +9 more
wiley   +1 more source

SOSEMANUK: a fast software-oriented stream cipher [PDF]

open access: yesNew Stream Cipher Designs - The eSTREAM finalists (2008) 98-118, 2008
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv  

KupferDigital: Ontology‐Based Digital Representation for the Copper Life Cycle

open access: yesAdvanced Engineering Materials, EarlyView.
It is demonstrated how data from different stages in the life cycle of a copper product can be stored in an ontology‐based data space. In order to showcase the methods and tools used in the project, four use cases are presented that show how data from different sources can be semantically described and queried from a shared data space.
Miriam Eisenbart   +18 more
wiley   +1 more source

Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers [PDF]

open access: yesarXiv, 2019
Lightweight stream ciphers are highly demanded in IoT applications. In order to optimize the hardware performance, a new class of stream cipher has been proposed. The basic idea is to employ a single Galois NLFSR with maximum period to construct the cipher. As a representative design of this kind of stream ciphers, Espresso is based on a 256-bit Galois
arxiv  

Home - About - Disclaimer - Privacy