Results 51 to 60 of about 159,796 (327)

A Water‐Soluble PVA Macrothiol Enables Two‐Photon Microfabrication of Cell‐Interactive Hydrogel Structures at 400 mm s−1

open access: yesAdvanced Materials, EarlyView.
A PVA‐based macromolecular thiol‐ene formulation enables efficient two‐photon polymerization at extremely low polymer concentrations and high writing speeds of 400 mm s−1 (20×), allowing high‐fidelity laser writing of cell‐interactive hydrogel structures on demand.
Wanwan Qiu   +6 more
wiley   +1 more source

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

Hashing with binary autoencoders

open access: yes, 2015
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á.   +1 more
core   +1 more source

Fully pipelined bloom filter architecture [PDF]

open access: yes, 2008
Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be ...
Koçak, T, Paynter, M
core   +2 more sources

Inactivation of AXL in Cardiac Fibroblasts Alleviates Right Ventricular Remodeling in Pulmonary Hypertension

open access: yesAdvanced Science, EarlyView.
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu   +17 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

The Lane hash function [PDF]

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to
  +7 more
core   +1 more source

Foundation Model‐Enabled Multimodal Deep Learning for Prognostic Prediction in Colorectal Cancer with Incomplete Modalities: A Multi‐Institutional Retrospective Study

open access: yesAdvanced Science, EarlyView.
FLARE, a multimodal AI framework, combines pathology slides, radiology scans, and clinical reports to predict colorectal cancer outcomes, even when some tests are missing. Evaluated retrospectively in 1679 patients from four medical centers, it consistently achieved the best prognostic accuracy and clearly separated high‐ and low‐risk groups.
Linhao Qu   +6 more
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy