Results 71 to 80 of about 10,475,631 (365)

Harnessing Blockchain for Sustainable Business Strategy: A Case Study on Enhancing Accounting Practices

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone   +3 more
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Learning to Hash-tag Videos with Tag2Vec

open access: yes, 2016
User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we
Narayanan, PJ   +3 more
core   +1 more source

Taming m‐Quionodimethanes by Dispersion Force: Cyclodimerization of (Trialkylsilyl)Ethynyl‐Substituted Indeno[2,1‐b]Fluorenes and Fluoreno[2,3‐b]Fluorenes

open access: yesChemistry – A European Journal, EarlyView.
Indeno[2.1‐b]fluorenes and fluoreno[2,3‐b]fluorenes having (trialkylsilyl)ethynyl groups dimerize spontaneously to yield the cyclodimers in the yields ranging from virtually zero to quantitative depending on the alkyl group. The regioselectivity of the bond formation (Head versus Tail) is also dependent on the alkyl group.
Ching‐En Hung   +8 more
wiley   +1 more source

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

open access: yesThe Scientific World Journal, 2015
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami   +3 more
doaj   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Parameterized Hash Functions

open access: yesAnnales UMCS, Informatica, 2012
In this paper we describe a family of highly parameterized hash functions. This parameterization results in great flexibility between performance and security of the algorithm. The three basic functions, HaF-256, HaF-512 and HaF-1024 constitute this hash function family. Lengths of message digests are 256, 512 and 1024 bits respectively.
Krzysztof Bucholc   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy