Results 81 to 90 of about 157,357 (284)

Spinal code based on lightweight hash function [PDF]

open access: yesArchives of Electrical Engineering, 2019
A spinal code is the type of rateless code, which has been proved to be capacity- achieving over both a binary symmetric channel (BSC) and an additive white Gaussian noise (AWGN) channel. Rateless spinal codes employ a hash function as a coding kernel to
Lina Wang, Xinran Li
doaj   +1 more source

The breaking of the AR Hash Function [PDF]

open access: yesDAIMI Report Series, 1993
<p>The AR hash function has been proposed by <em> Algorithmic Research Ltd</em>. It has been circulated in the ISO community (Working group 2, document WG2/N179), and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode.
Damgård, Ivan Bjerre   +1 more
openaire   +3 more sources

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices

open access: yesIEEE Access, 2020
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari   +4 more
doaj   +1 more source

Drug Critical Limits for Urgent Physician Notification

open access: yesClinical Pharmacology &Therapeutics, EarlyView.
Critical limits represent quantitative decision thresholds for drugs that require immediate clinician notification and potential life‐saving intervention. United States hospitals lack a national standard for drug critical limits. We collected critical limits from 417 US hospitals across all 50 states and Washington, D.C.; of these, 411 maintained drug ...
Elina Kuang   +3 more
wiley   +1 more source

Asymmetric Deep Supervised Hashing

open access: yes, 2017
Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many ...
Jiang, Qing-Yuan, Li, Wu-Jun
core   +1 more source

Genomic Insights Into Risperidone Treatment Outcomes in Children and Adolescents: Experience From a Psychiatric Hospital Serving Rural Youth

open access: yesClinical Pharmacology &Therapeutics, EarlyView.
Risperidone is a commonly used antipsychotic for treating psychiatric illness in children and adolescents. There is a large variability in risperidone response and discontinuation rates remain high. Pharmacogenomics offers the opportunity to improve risperidone outcomes, yet studies in pediatric populations are limited.
Jack W. Staples   +10 more
wiley   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

Energy metabolism, adenosine, and glutamate signaling reprogramming by decanoic acid in Glut1 disorder syndrome

open access: yesEpilepsia Open, EarlyView.
Abstract Glut1 deficiency syndrome (Glut1DS) leads to neurological and cognitive symptoms and is primarily treated using carbohydrate‐restricted ketogenic diets. However, a recent clinical trial of a less restrictive, non‐ketogenic, medium chain triglyceride (MCT) diet with a high decanoic acid content suggests efficacy in Glut1DS treatment.
Erwann Pain   +10 more
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy