Results 101 to 110 of about 159,796 (327)
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng +3 more
wiley +1 more source
A multifunctional electrospun scaffold combining polyurethane, carbon nanotubes, and liposomal hesperidin supports neural stem cell survival, adhesion, and expansion. This platform enhances conductivity, mechanical strength, and hydrophilicity while mimicking the native neural environment.
Arman Abroumand Gholami +8 more
wiley +1 more source
An efficient and secure technique for image steganography using a hash function. [PDF]
Nezami ZI +5 more
europepmc +1 more source
Hash Embeddings for Efficient Word Representations
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz +2 more
core
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
PPP-Completeness with Connections to Cryptography [PDF]
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina +2 more
core +1 more source
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang +5 more
doaj +1 more source
The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function. [PDF]
Okada K, Brumby PE, Yasuoka K.
europepmc +1 more source
Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley +1 more source

