Results 51 to 60 of about 1,611 (184)

Information retrieval or document retrieval? Terminological confusions and unrealistic goals in information science, exemplified in relation to generative artificial intelligence

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley   +1 more source

Improving the learning experience in an undergraduate course on microbial metabolism by using an illustrated story

open access: yesBiochemistry and Molecular Biology Education, Volume 53, Issue 2, Page 131-141, March/April 2025.
Abstract In the classroom, metabolism is often approached and received as a mundane exercise in memorization. Teaching metabolism also faces the challenge of negative perceptions that can impede learning. We sought to improve the learning experience in an undergraduate lecture course on microbial metabolism by implementing an illustrated story that ...
James B. McKinlay, Katherine Kearns
wiley   +1 more source

Optimal model‐based design of experiments for parameter precision: Supercritical extraction case

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley   +1 more source

Research of Hamming weight-based algebraic side-channel attack on LED

open access: yesTongxin xuebao, 2013
:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were ...
Ke-ke JI   +4 more
doaj   +2 more sources

Discrimination in a General Algebraic Setting

open access: yesThe Scientific World Journal, 2015
Discriminating groups were introduced by G. Baumslag, A. Myasnikov, and V. Remeslennikov as an outgrowth of their theory of algebraic geometry over groups.
Benjamin Fine   +3 more
doaj   +1 more source

Static and Dynamic Analysis of Porous Gas Bearings Lubricated With Air, Refrigerant R‐134a, Helium and Hydrogen

open access: yesLubrication Science, EarlyView.
ABSTRACT Porous gas bearings (PGBs) enable high‐speed, oil‐free operation in modern rotating machinery. This study develops a coupled thermo‐hydrodynamic (THD) model for a cylindrical porous gas bearing lubricated with four working fluids—air, R‐134a, helium and hydrogen.
S. Bechiri, B. Bouchehit, B. Bou‐Saïd
wiley   +1 more source

Extending the hyper‐logistic model to the random setting: New theoretical results with real‐world applications

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
We develop a full randomization of the classical hyper‐logistic growth model by obtaining closed‐form expressions for relevant quantities of interest, such as the first probability density function of its solution, the time until a given fixed population is reached, and the population at the inflection point.
Juan Carlos Cortés   +2 more
wiley   +1 more source

Analysis of the success probability of cube attack

open access: yesTongxin xuebao, 2012
The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic ...
Hai-xin SONG   +3 more
doaj   +2 more sources

The Security Weakness of Block Cipher Piccolo against Fault Analysis

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song   +2 more
doaj   +1 more source

From Stability to Chaos: A Complete Classification of the Damped Klein‐Gordon Dynamics

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We investigate the transition between stability and chaos in the damped Klein‐Gordon equation, a fundamental model for wave propagation and energy dissipation. Using semigroup methods and spectral criteria, we derive explicit thresholds that determine when the system exhibits asymptotic stability and when it displays strong chaotic dynamics ...
Carlos Lizama   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy