ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Languages
Education
Literature
Technology
Mathematics
Biology
Computing
Social Sciences
Pure sciences
Research
all records (75)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Ukraine
Brazil
Italy
South Africa
Poland
Pakistan
Turkey, Turkish Republic
Australia
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
61.945  Articles
1 of 6.195 pages  |  10  records  |  more records»
Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception strategies... see more

In this paper a parallel Hash algorithm construction based on the Chebyshev Halley methods with variable parameters is proposed and analyzed. The two core characteristics of the recommended algorithm are parallel processing mode and chaotic... see more

Security information method for jpeg / exif documents generally aims to prevent security attack by protecting documents with password and watermark. Both methods cannot used to determine the condition of data integrity at the detection stage of the inform... see more

Background: Our aim was to establish how healthy subjects (HS) and patients with euthyroid Hashimoto's thyroiditis (EuHT) faced the increase in mandatory salt iodization in Slovenia in 1999 from previous 10 mg of potassium iodide to 25 mg per kg since dat... see more

In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its impleme... see more

Background: Mitral stenosis is the most common mitral valve disease found in Indonesia. Mechanical obstruction of blood flow from left atrium to left ventricle is compensated by pressure elevation in the left atrium and pulmonary circulation. It leads to ... see more

Purpose: The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the di... see more

Objectives: The objective of this study was to assess the utility of novel macular hole indices of Optical Coherence Tomography (OCT) and predicting the functional outcome of surgery.Methods: This was a retrospective chart review of 28 eyes who underwent ... see more

1 of 6.195 pages  |  10  records  |  more records»