Results 81 to 90 of about 154,141 (333)
Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari +4 more
doaj +1 more source
GA: Four‐step process for cannabidiol (CBD) detection in Cannabis sativa extracts. (1) The plant extract is obtained. (2) An electrochemical sensor detects CBD using a screen‐printed electrode. (3) Electrochemical signatures of real samples are recorded, showing current vs. potential curves.
Wanda Cimmino +13 more
wiley +1 more source
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl +2 more
wiley +1 more source
Energy Consumption of Hash Functions
We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Java-enabled smart phone. Energy efficiency of 17 hash functions (Adler32, Crc16, Crc32, Haval256, MD2, MD4, MD5, MD6, SHA1, SHA224, SHA256, SHA384, SHA512, Skein, SV1, Tiger, Whirlpool) is ...
Damasevicius, R. +4 more
openaire +3 more sources
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut +8 more
wiley +1 more source
Identification of Tetrahydrocannabidiol Metabolites in Human Urine
The detection of Phase I and II metabolites of tetrahydrocannabidiol (H4CBD) in urine after oral ingestion of 25‐mg H4CBD by a volunteer is described. The proposed metabolite structures are based on ESI+ spectra recorded by HPLC‐HRMS and EI spectra after trimethylsilylation recorded by GC–MS.
Willi Schirmer +3 more
wiley +1 more source
Analysis of hash function of Yi and Lam
A block cipher based hash function of Yi and Lam is analysed and shown to be significantly weaker than originally intended.
Martin, Keith M., Mitchell, Chris J
openaire +10 more sources
Why Bonuses Promote Deviant Behaviors: A Self‐Determination Theory Perspective
ABSTRACT Bonuses are notoriously used to motivate workers. How effective are they at doing so, and might there be unintended consequences? We investigated the effectiveness of bonuses based on game profitability on the motivation of video game developers by examining specific bonus characteristics that align with advice derived from expectancy theory ...
Marylène Gagné +4 more
wiley +1 more source
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj +2 more sources

