Investigation of the potential of waxworm saliva, the secretion of Galleria mellonella, for plastic degradation.
Read More...Browse Articles
A 1D model of ultrasound waves for diagnosing of hepatomegaly and cirrhosis
The authors created a 1D model to diagnose hepatomegaly and cirrhosis via ultrasound of the liver.
Read More...A comparative study of food labels in the United States and India: Adherence to Codex Alimentarius guidelines
This study investigated how well food labels from 280 different brands across multiple food and drink categories in India and the US adhered to recommended nutritional labeling standards as outlined by the Codex Alimentarius.
Read More...A comparative analysis of machine learning approaches to predict brain tumors using MRI
The authors use machine learning on MRI images of brain tissue to predict tumor onset as an avenue for early detection of brain cancer.
Read More... A low-cost method for purification of agricultural wastewater based on S. platensis
The authors looked at the ability of Spirulina platensis to reduce contaminants in wastewater in order to develop a more accessible treatment option. They found that S platensis did reduce the concentration of pollutants present within simulated agricultural wastewater.
Read More...A comparative study on the long-term effects of music and sports activities on cognitive skills of children
The study explores how music and sports impact cognitive development in young children, particularly in relation to learning disorders like ADHD and dyslexia.
Read More...A statistical analysis and generalized linear models of cerebral stroke
Here the authors sought to investigate whether and how cerebral stroke and other health-related variables are influenced together and amongst each other by using statistical analyses. Their analysis suggested relations between nearly all variables considered, with the strongest association between having heart disease and a cerebral stroke.
Read More...A natural language processing approach to skill identification in the job market
The authors looked at using machine learning to identify skills needed to apply for certain jobs, specifically looking at different techniques to parse apart the text. They found that Bidirectional Encoder Representation of Transforms (BERT) performed best.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...A comparative study of dynamic scoring formulas for capture-the-flag competitions
The use of gamification in cybersecurity education, particularly through capture-the-flag competitions, involves scoring challenges based on their difficulty and the number of teams that solve them. The study investigated how changing the scoring formulas affects competition outcomes, predicting that different formulas would alter score distributions.
Read More...