Results 101 to 110 of about 275,265 (273)
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source
Função ‘hash’ e a integridade da prova digital
O artigo aborda a função 'hash' como ferramenta para garantir a integridade de dados digitais, examinando seus fundamentos, limitações e aplicação no contexto da cadeia de custódia de provas digitais. A despeito das previsões do Código de Processo Penal,
Yuri Fisberg
doaj +1 more source
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang +8 more
wiley +1 more source
Spatiotemporal mapping the usable space of free‐roaming equids across the western United States
Identification of the inter‐decadal (2010‐2011) enhancement‐degradation gradients in the usable space for wild equid Herd Management Areas in the Great Basin, USA. Abstract Management of feral equids in the American West is hindered by the lack of a formal habitat map and monitoring system.
Alexander Hernandez +3 more
wiley +1 more source
Prevention of Unauthorized Software Execution: Identification of Applications
In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.
E. Y. Rodionov, M. V. Senik
doaj
An Adaptive and Asymmetric Residual Hash for Fast Image Retrieval
Hashing algorithm has attracted great attention in recent years. In order to improve the query speed and retrieval accuracy, this paper proposes an adaptive and asymmetric residual hash (AASH) algorithm based on residual hash, integrated learning, and ...
Shuli Cheng, Liejun Wang, Anyu Du
doaj +1 more source
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa +2 more
core +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source

