Results 71 to 80 of about 2,144,321 (256)
Understanding the Temperature Conditions for Controlled Splicing Between Silica and Fluoride Fibers
Thermal splicing conditions are investigated between silica and ZrF4 fibers, focusing on mechanical strength. A fiber Bragg grating characterises the thermal profile in the filament splicer's hot zone. Results indicate a narrow temperature window for strong joints.
Antreas Theodosiou+7 more
wiley +1 more source
An exponential open hashing function based on dynamical systems theory [PDF]
In this paper an efficient open addressing hash function called exponential hashing is developed using concepts from dynamical systems theory and number theory.
Abdallah, Chaouki T.+2 more
core +1 more source
Electro‐Thermal Response of Thin Film Heaters Based on Embedded Periodic Metallic Mesh
“This study systematically investigates the effect of periodic metallic mesh topology on electrical and electro‐thermal behaviours of thin thermal heaters. The derived closed‐form expressions capture the dependence of sheet resistance on design parameters, providing a crucial tool for rapidly exploring a vast design space and accelerating design and ...
Dimitrios Charaklias+3 more
wiley +1 more source
The target of rapamycin (TOR) complex is a central plant growth regulator. Here, the protein–protein interactions underlying its various functions are mapped by pupylation‐based proximity‐labeling in Arabidopsis, using TOR complex subunits LST8‐1 and RAPTOR1, alongside TOR inhibitor FK506‐binding protein, as baits.
Shuai Zheng+9 more
wiley +1 more source
A Case for Partitioned Bloom Filters [PDF]
In a partitioned Bloom Filter the $m$ bit vector is split into $k$ disjoint $m/k$ sized parts, one per hash function. Contrary to hardware designs, where they prevail, software implementations mostly adopt standard Bloom filters, considering partitioned filters slightly worse, due to the slightly larger false positive rate (FPR).
arxiv +1 more source
Attacks on double block length hash functions [PDF]
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire +1 more source
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios+3 more
core +1 more source
This article describes a robust, sustainable, and industrially viable three‐step process to transform rapeseed oil methyl esters (RME) into biofuel with a boiling point curve that fulfills the modern diesel specifications for the use in contemporary diesel engines.
Mykhailo Kondratiuk+3 more
wiley +1 more source
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez+2 more
wiley +1 more source
Forecasting Digital Asset Return: An Application of Machine Learning Model
ABSTRACT In this study, we aim to identify the machine learning model that can overcome the limitations of traditional statistical modelling techniques in forecasting Bitcoin prices. Also, we outline the necessary conditions that make the model suitable.
Vito Ciciretti+4 more
wiley +1 more source