Results 81 to 90 of about 10,475,631 (365)

Trends and Insights in Arab Audit Research: A Bibliometric Exploration

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, EarlyView.
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley   +1 more source

Asymmetric Deep Supervised Hashing

open access: yes, 2017
Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many ...
Jiang, Qing-Yuan, Li, Wu-Jun
core   +1 more source

A systematic approach for identifying drivers of critical safety and establishing their hierarchy

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Learning from incidents is a crucial step in preventing and mitigating adverse events. Incident databases offer valuable insights for safety management improvements by cause and contributing factors. However, extracting meaningful information from incident investigation reports poses a significant challenge. This study introduces a data‐driven
Mohammad Zaid Kamil   +2 more
wiley   +1 more source

Spinal code based on lightweight hash function [PDF]

open access: yesArchives of Electrical Engineering, 2019
A spinal code is the type of rateless code, which has been proved to be capacity- achieving over both a binary symmetric channel (BSC) and an additive white Gaussian noise (AWGN) channel. Rateless spinal codes employ a hash function as a coding kernel to
Lina Wang, Xinran Li
doaj   +1 more source

Chemometrics‐Assisted Electrochemical Device for Cannabidiol Detection in Real Cannabis sativa Samples

open access: yesChemistry–Methods, EarlyView.
GA: Four‐step process for cannabidiol (CBD) detection in Cannabis sativa extracts. (1) The plant extract is obtained. (2) An electrochemical sensor detects CBD using a screen‐printed electrode. (3) Electrochemical signatures of real samples are recorded, showing current vs. potential curves.
Wanda Cimmino   +13 more
wiley   +1 more source

Energy Consumption of Hash Functions

open access: yesElectronics and Electrical Engineering, 2012
We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Java-enabled smart phone. Energy efficiency of 17 hash functions (Adler32, Crc16, Crc32, Haval256, MD2, MD4, MD5, MD6, SHA1, SHA224, SHA256, SHA384, SHA512, Skein, SV1, Tiger, Whirlpool) is ...
Damasevicius, R.   +4 more
openaire   +3 more sources

A continuous 500‐year sediment record of inundation by local and distant tsunamis in South‐Central Chile (40.1°S)

open access: yesThe Depositional Record, EarlyView.
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut   +8 more
wiley   +1 more source

FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices

open access: yesIEEE Access, 2020
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari   +4 more
doaj   +1 more source

Infant Death due to Cannabis Ingestion

open access: yesDrug Testing and Analysis, EarlyView.
ABSTRACT A child died in the emergency room of a local hospital a few hours after ingesting a substance the color of cork and the consistency of earth. At home, a modest amount of resinous substance was found. At the hospital, the child exhibited alterations in walking, balance, and consciousness.
Donata Favretto   +9 more
wiley   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Home - About - Disclaimer - Privacy