Results 91 to 100 of about 10,638,853 (320)
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE +4 more
doaj +2 more sources
Verifiable Random Functions (VRFs) [PDF]
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon +3 more
core
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley +1 more source
Video retrieval based on deep convolutional neural network
Recently, with the enormous growth of online videos, fast video retrieval research has received increasing attention. As an extension of image hashing techniques, traditional video hashing methods mainly depend on hand-crafted features and transform the ...
Dong, Yj, Li, JG
core +1 more source
A novel parallel hash function based on 3D chaotic map
As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions.
A. Akhavan, A. Samsudin, A. Akhshani
semanticscholar +1 more source
Abstract Response bias for sensitive questions in face‐to‐face interviewer‐administered surveys is a common problem. Our objective was to evaluate the effectiveness of the nonverbal response card (NVRC) in soliciting responses to questions about lifetime trauma exposure and posttraumatic stress disorder (PTSD) symptoms.
David P. Lindstrom +4 more
wiley +1 more source
Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]
Ghadi YY +5 more
europepmc +1 more source
Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin +13 more
wiley +1 more source
Hash Embeddings for Efficient Word Representations
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz +2 more
core
This graphical abstract illustrates the cloud‐based GWAS platform as a hub that integrates six major multiomics domains: phenomics, neuroscience, proteomics, microbiomics, metabolomics, and nutrigenomics. The platform unifies diverse data types—including clinical phenotypes, neuroimaging, plasma proteomics, microbiome profiles, metabolic biomarkers ...
Xiaohong Ke +12 more
wiley +1 more source

