Results 81 to 90 of about 154,141 (333)

Trends and Insights in Arab Audit Research: A Bibliometric Exploration

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, EarlyView.
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley   +1 more source

FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices

open access: yesIEEE Access, 2020
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari   +4 more
doaj   +1 more source

Chemometrics‐Assisted Electrochemical Device for Cannabidiol Detection in Real Cannabis sativa Samples

open access: yesChemistry–Methods, EarlyView.
GA: Four‐step process for cannabidiol (CBD) detection in Cannabis sativa extracts. (1) The plant extract is obtained. (2) An electrochemical sensor detects CBD using a screen‐printed electrode. (3) Electrochemical signatures of real samples are recorded, showing current vs. potential curves.
Wanda Cimmino   +13 more
wiley   +1 more source

The Impact of Environmental Information on Cryptocurrency Investment Allocation Decisions: An Experimental Survey Study

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl   +2 more
wiley   +1 more source

Energy Consumption of Hash Functions

open access: yesElectronics and Electrical Engineering, 2012
We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Java-enabled smart phone. Energy efficiency of 17 hash functions (Adler32, Crc16, Crc32, Haval256, MD2, MD4, MD5, MD6, SHA1, SHA224, SHA256, SHA384, SHA512, Skein, SV1, Tiger, Whirlpool) is ...
Damasevicius, R.   +4 more
openaire   +3 more sources

A continuous 500‐year sediment record of inundation by local and distant tsunamis in South‐Central Chile (40.1°S)

open access: yesThe Depositional Record, EarlyView.
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut   +8 more
wiley   +1 more source

Identification of Tetrahydrocannabidiol Metabolites in Human Urine

open access: yesDrug Testing and Analysis, EarlyView.
The detection of Phase I and II metabolites of tetrahydrocannabidiol (H4CBD) in urine after oral ingestion of 25‐mg H4CBD by a volunteer is described. The proposed metabolite structures are based on ESI+ spectra recorded by HPLC‐HRMS and EI spectra after trimethylsilylation recorded by GC–MS.
Willi Schirmer   +3 more
wiley   +1 more source

Why Bonuses Promote Deviant Behaviors: A Self‐Determination Theory Perspective

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Bonuses are notoriously used to motivate workers. How effective are they at doing so, and might there be unintended consequences? We investigated the effectiveness of bonuses based on game profitability on the motivation of video game developers by examining specific bonus characteristics that align with advice derived from expectancy theory ...
Marylène Gagné   +4 more
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy