Results 71 to 80 of about 10,475,631 (365)
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone+3 more
wiley +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi+7 more
wiley +1 more source
Hashing for Similarity Search: A Survey [PDF]
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu+3 more
core
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil+2 more
wiley +1 more source
Learning to Hash-tag Videos with Tag2Vec
User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we
Narayanan, PJ+3 more
core +1 more source
Indeno[2.1‐b]fluorenes and fluoreno[2,3‐b]fluorenes having (trialkylsilyl)ethynyl groups dimerize spontaneously to yield the cyclodimers in the yields ranging from virtually zero to quantitative depending on the alkyl group. The regioselectivity of the bond formation (Head versus Tail) is also dependent on the alkyl group.
Ching‐En Hung+8 more
wiley +1 more source
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami+3 more
doaj +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.+5 more
core +1 more source
In this paper we describe a family of highly parameterized hash functions. This parameterization results in great flexibility between performance and security of the algorithm. The three basic functions, HaF-256, HaF-512 and HaF-1024 constitute this hash function family. Lengths of message digests are 256, 512 and 1024 bits respectively.
Krzysztof Bucholc+3 more
openaire +3 more sources