Academic literature on the topic 'SCRAMBLING AND UNSCRAMBLING'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SCRAMBLING AND UNSCRAMBLING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SCRAMBLING AND UNSCRAMBLING"

1

Benkenstein, Alex. "Africa's natural resources: scrambling for success, unscrambling terminology." South African Journal of International Affairs 18, no. 2 (August 2011): 271–74. http://dx.doi.org/10.1080/10220461.2011.588831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Prescott, D. "The evolutionary scrambling and developmental unscrambling of germline genes in hypotrichous ciliates." Nucleic Acids Research 27, no. 5 (March 1, 1999): 1243–50. http://dx.doi.org/10.1093/nar/27.5.1243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rwabutaza, Allan, Ming Yang, and Nikolaos Bourbakis. "A Comparative Survey on Cryptology-Based Methodologies." International Journal of Information Security and Privacy 6, no. 3 (July 2012): 1–37. http://dx.doi.org/10.4018/jisp.2012070101.

Full text
Abstract:
Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender’s side and message unscrambling on the receiver’s side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology (or crypto) while steganography and steganalysis make up steganology (or stegano). This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis.
APA, Harvard, Vancouver, ISO, and other styles
4

Tang, J. G., and C. L. Tsou. "The insulin A and B chains contain structural information for the formation of the native molecule. Studies with protein disulphide-isomerase." Biochemical Journal 268, no. 2 (June 1, 1990): 429–35. http://dx.doi.org/10.1042/bj2680429.

Full text
Abstract:
It has been shown previously [Tang, Wang & Tsou (1988) Biochem. J. 255, 451-455] that, under appropriate conditions, native insulin can be obtained from scrambled insulin or the S-sulphonates of the chains with a yield of 25-30%, together with reaction products containing the separated A and B chains. The native hormone is by far the predominant product among the isomers containing both chains. It is now shown that the presence of added C peptide has no appreciable effect on the yield of native insulin. At higher temperatures the content of the native hormone decreases whereas those of the separated chains increase, and in no case was scrambled insulin containing both chains the predominant product in the absence of denaturants. Both the scrambling and the unscrambling reactions give similar h.p.l.c. profiles for the products. Under similar conditions cross-linked insulin with native disulphide linkages can be obtained from the scrambled molecule or from the S-sulphonate derivative with yields of 50% and 75% respectively at 4 degrees C, and with a dilute solution of the hexa-S-sulphonate yields better than 90% can be obtained. The regenerated product is shown to have the native disulphide bridges by treatment with CNBr to give insulin and by the identity of the h.p.l.c. profile of its peptic hydrolysate with that for cross-linked insulin. It appears that the insulin A and B chains contain sufficient information for the formation of the native molecule and that the role of the connecting C peptide is to bring and to keep the two chains together.
APA, Harvard, Vancouver, ISO, and other styles
5

Būtaitė, Unė G., Hlib Kupianskyi, Tomáš Čižmár, and David B. Phillips. "How to Build the “Optical Inverse” of a Multimode Fibre." Intelligent Computing 2022 (November 17, 2022): 1–13. http://dx.doi.org/10.34133/2022/9816026.

Full text
Abstract:
When light propagates through multimode optical fibres (MMFs), the spatial information it carries is scrambled. Wavefront shaping reverses this scrambling, typically one spatial mode at a time—enabling deployment of MMFs as ultrathin microendoscopes. Here, we go beyond sequential wavefront shaping by showing how to simultaneously unscramble all spatial modes emerging from an MMF in parallel. We introduce a passive multiple-scattering element—crafted through the process of inverse design—that is complementary to an MMF and undoes its optical effects. This “optical inverter” makes possible single-shot widefield imaging and super-resolution imaging through MMFs. Our design consists of a cascade of diffractive elements, and can be understood from the perspective of both multi-plane light conversion, and as a physically inspired diffractive neural network. This physical architecture outperforms state-of-the-art electronic neural networks tasked with unscrambling light, as it preserves the phase and coherence information of optical signals flowing through it. We show, in numerical simulations, how to efficiently sort and tune the relative phase of up to ~400 step-index fibre modes, reforming incoherent images of scenes at arbitrary distances from the fibre facet. Our optical inverter can dynamically adapt to see through experimentally realistic flexible fibres—made possible by moulding optical memory effects into its design. The scheme is based on current fabrication technology so could be realised in the near future. Beyond imaging, these concepts open up a range of new avenues for optical multiplexing, communications, and computation in the realms of classical and quantum photonics.
APA, Harvard, Vancouver, ISO, and other styles
6

"4535355 Method and apparatus for scrambling and unscrambling data streams using encryption and decryption." Telematics and Informatics 3, no. 1 (January 1986): X. http://dx.doi.org/10.1016/s0736-5853(86)80056-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Improved Ability Multi Keyword Search System on Cloud Web Server." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 2421–25. http://dx.doi.org/10.35940/ijeat.f8535.088619.

Full text
Abstract:
The movement of clients from desktop to mobility devices, made a major stage in the portable trade. All the up and coming advancements, parts, delicate products are very composed by the portable. As versatility is unavoidable prerequisite by the clients, the outline of programming with less battery utilization are generally invited. The calculation procedure is relative to the battery utilization. The calculation at the cell phones genuinely influences the series of the portable. Hence making the calculation at the cloud has an awesome arrangement in diminishing the battery utilization. The delegate calculation inquiry is a productive approach to safeguard the battery of the mobile devices. Indeed, even the encryption/unscrambling of records takes control so proposing IOPE for scrambling the document which is a basic plan
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SCRAMBLING AND UNSCRAMBLING"

1

RAJAT, BHATNAGAR. "NEW ALGORITHMS IN COLOR VISUAL CRYPTOGRAPHY." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16176.

Full text
Abstract:
Visual cryptography framework is a cryptographic technique which permits visual data (E.g. composed content, manually written notes and pictures) to be encoded in such a way, that decoding can be performed by the person visual framework, without the help of PCs. There are different measures, on which execution of visual cryptography plot depends, for example, • pixel extension, • contrast • security • Accuracy • computational unpredictability • share created is significant or negligible • nature of secret pictures( whichever double or shading) and • Number of secret images (whichever single or various) scrambled by the strategy. Visual cryptography is a decent method for scrambling and unscrambling information on machines that have less figuring power since it doesn't depends on complex scientific squares and structures for encryption and decoding.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SCRAMBLING AND UNSCRAMBLING"

1

Li, Shenping, Nolan A. Daniel, Dmitri V. Kuksenkov, and Roe Hemenway. "Passive Scrambling and Unscrambling for Secure Fiber Optic Communications." In 2008 Conference on Optical Fiber Communication - OFC 2008 Collocated National Fiber Optic Engineers. IEEE, 2008. http://dx.doi.org/10.1109/ofc.2008.4528238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography