Results 151 to 160 of about 10,638,853 (320)
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source
Some Plausible Constructions of Double-Block-Length Hash Functions [PDF]
Shoichi Hirose
openalex +1 more source
Novel Duplicate Address Detection with Hash Function. [PDF]
Song G, Ji Z.
europepmc +1 more source
Provably Good Codes for Hash Function Design [PDF]
Charanjit S. Jutla, Anindya C. Patthak
openalex +1 more source
A link between increased temperature and avian body condition in a logged tropical forest
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi +7 more
wiley +1 more source
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source
Security enhanced multi-factor biometric authentication scheme using bio-hash function. [PDF]
Choi Y, Lee Y, Moon J, Won D.
europepmc +1 more source
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding
Mustafa Ayoob, Wael Adi
openalex +1 more source
Cracking Intel Sandy Bridge's Cache Hash Function [PDF]
Zhipeng Wei, Zehan Cui, Mingyu Chen
openalex +1 more source

