Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   15  
      Materials EngineeringChemical EngineeringMaterials ScienceChemistry
    • by 
    •   20  
      Cognitive ScienceComputer ScienceComputer GraphicsArt
    • by 
    •   7  
      Computer ScienceEncryptionKey wordsVerilog
Deep eutectic solvents (DES) based on water as the only hydrogen bond donor (HBD) have been introduced recently (aquoline). There is not a single report on surfactant association behaviour in aquoline. This study deals with the... more
    • by 
    •   15  
      Materials ScienceChemistryPhysical ChemistryGreen Chemistry
    • by 
    •   20  
      EngineeringPhysicsAcousticsMechanics
    • by 
    •   20  
      EndocrinologyBiologyFertilityDevelopment
    • by 
    •   20  
      Environmental EngineeringCivil EngineeringGeographyEarth Sciences
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate... more
    • by 
    •   7  
      Information SecurityComplianceEncryptionData Security
DNA Computing has emerged as a promising field since its inception when Leonard M. Adleman first used DNA for solving computational problem of the Hamiltonian Path in 1994 [1]. DNA Self Assembly utilizes ’bottom-up’ approach for design... more
    • by 
    •   7  
      DNA computingImage EncryptionDNA self-assembled computingLook up Table
    • by 
    •   17  
      Mechanical EngineeringComputer ScienceDSMValue Stream Mapping
    • by 
    •   17  
      EngineeringComputer ScienceFPGACPA
    • by 
    •   7  
      Environmental EngineeringCivil EngineeringGeologyHydrogeology
    • by 
    •   19  
      BiochemistryPhysiologyBiophysicsMaterials Science
    • by 
    •   14  
      Computer ScienceComputer ArchitectureFPGACryptography
    • by 
    •   8  
      Computer ScienceEncryptionWirelessComputer Applications
In this contribution instances of a problem introduced by the differential cryptanalysis of Feistel cryptosystems are formulated as optimization tasks. The performance of Evolutionary Computation methods on these tasks is studied for a... more
    • by 
    •   4  
      Computational IntelligenceEvolutionary ComputationDifferential cryptanalysisDes
    • by 
    •   20  
      EducationHumanitiesPolitical ScienceEvaluation
      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence... more
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionFlexibility in engineering design
    • by 
    •   5  
      PhysicsAstrofísicaAstronomíaDetector
    • by 
    •   10  
      EngineeringMechanicsVehicle EngineeringDrag
    • by 
    •   6  
      Computer ScienceEncryptionData SecurityOLAP
Ilmu kriptografi merupakan sebuah informasi yang akan disampaikan kepada pihak lain dengan bentuk yang tidak dimengerti. Pada saat ini ilmu kriptografi sangat diperlukan sebagai pertukaran informasi /data. Begitu pentingan informasinya... more
    • by 
    •   2  
      PhysicsHumanities
    • by 
    •   8  
      GeographyPolitical ScienceDivorceDroit International Prive
    • by 
    •   9  
      Computer ScienceMachine LearningData MiningSituation Assessment
    • by 
    •   5  
      Computer ScienceEncryptionImage Analysis (Mathematics)Computer Applications
    • by 
    •   6  
      Computer ScienceEncryptionImage Analysis (Mathematics)Image
    • by 
    •   20  
      MicroRNACancerBiologyMedicine
    • by 
    •   15  
      Computer ScienceType TheoryNormalizationSubject Reduction
Several proof-assistants rely on the very formal basis of Pure Type Systems (PTS) as their foundations. We are concerned with the issues involved in the development of large proofs in these provers such as namespace management,... more
    • by 
    •   16  
      Applied MathematicsComputer ScienceFunctional ProgrammingUsability
    • by 
    •   6  
      Materials ScienceChemistryDecompositionLignin
    • by 
    •   12  
      BiochemistryGeneticsMicrobiologyBiophysics
    • by 
    •   10  
      PhysiologyBiologyMedicineDes
    • by 
    •   15  
      Environmental EngineeringCivil EngineeringEnvironmental ScienceGeology
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business... more
    • by 
    •   4  
      EncryptionAESDesTDS
    • by 
    •   12  
      Computer ScienceFPGAEncryptionAlgorithm
In this era of communication Data Security is primary concern. This paper introduce the concept of Clocked Hybrid Encryption .The term clocked hybrid represent DES & AES hybrid algorithm which is synchronized with key . In this algorithm... more
    • by 
    •   12  
      Computer ScienceFPGAEncryptionAlgorithm
    • by 
    •   15  
      Computer ScienceDatabase SystemsWeb DevelopmentCryptography
Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs... more
    • by 
    •   3  
      GPSCryptographic AlgorithmAndroid SDK
    • by 
    •   2  
      PsychologyHumanities
    • by 
    •   2  
      Political ScienceLaw and Political Science
    • by 
    •   2  
      HumanitiesPolitical Science
As the amount of data and information received and sent electronically increases in various Small and Medium Enterprises, companies and organizations, the adoption of cloud Database as a Service is becoming popular in the global business... more
    • by 
    •   4  
      EncryptionAESDesTDS
In recent years, lignin valorization is commercially an important and advanced sustainable process for lignocellulosic biomass-based industries, primarily through the depolymerization path. The conversion of the lignin moieties into... more
    • by 
    •   11  
      ChemistryBiorefineryBIOCHARMedicine
    • by 
    •   7  
      ChemistryMicrowaveLigninPulp and Paper Industry
    • by 
    •   17  
      SociologyPhilosophyHumanitiesBlack Liberation Theology
Confidential data is concealed through encryption, which turns it into an unintelligible format. This study aims to evaluate the efficiency of encryption techniques for Image, Video, Audio, and Document Data Types in Java. This study... more
    • by 
    • Encryption Algorithms
    • by 
    •   5  
      Computer ScienceMultimediaSecurityEncryption
    • by 
    •   5  
      LawInternational LawPolitical ScienceConflict of Laws
    • by 
    •   15  
      Mechanical EngineeringAerospace EngineeringPhysicsMechanics
    • by 
    •   4  
      DERECHO CIVILDerecho ComunitarioDerecho ProcesalDerecho internacional privado