Results 71 to 80 of about 157,357 (284)

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

PPP-Completeness with Connections to Cryptography [PDF]

open access: yes, 2018
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina   +2 more
core   +1 more source

Linear Hashing is Awesome

open access: yes, 2016
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core   +1 more source

Material‐Based Intelligence: Autonomous Adaptation and Embodied Computation in Physical Substrates

open access: yesAdvanced Intelligent Systems, EarlyView.
This perspective formulates a unifying framework for Material‐Based Intelligence (MBI), defining the physical requirements for materials to achieve embodied action, active memory and embodied information processing through intrinsic nonequilibrium dynamics. The design of intelligent materials often draws parallels with the complex adaptive behaviors of
Vladimir A. Baulin   +4 more
wiley   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Learning to Hash-tag Videos with Tag2Vec

open access: yes, 2016
User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we
Narayanan, PJ   +3 more
core   +1 more source

Genomic Contributors to Congenital Diaphragmatic Hernia: Results of Exome Sequencing in 560 Probands and Cross Reference of Findings in an Independent Cohort

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT There is a strong genetic contribution to the etiology of congenital diaphragmatic hernia (CDH). This study evaluated genetic testing results and diagnostic yield for fetuses and children with CDH. This was a retrospective cohort study of exome sequencing (ES) performed at GeneDx for fetuses and children ≤ 18 years of age with CDH compared ...
Justin Blair   +9 more
wiley   +1 more source

Blockchain Technology and the Circular Economy Transition: Associations With Company Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy