Results 101 to 110 of about 123,825 (281)
Online Supervised Sketching Hashing for Large-Scale Image Retrieval
Online hashing methods have achieved a good tradeoff between the accuracy and the efficiency for learning the hash functions in the online settings. Compared to the stochastic gradient descent-based online hashing methods, the data sketching-based online
Zhenyu Weng, Yuesheng Zhu
doaj +1 more source
Quantitative Imaging of Pyruvate Metabolism in a Patient With Anaplastic Thyroid Cancer
ABSTRACT Purpose Magnetic resonance imaging using hyperpolarized (HP) [1‐13C]‐pyruvate enables assessment of pyruvate metabolism in vivo and offers new insight into metabolic changes in response to cancer therapy. Widely used semi‐quantitative metrics of pyruvate metabolism can be affected by physiological factors that are extrinsic to intracellular ...
James A. Bankson +18 more
wiley +1 more source
ABSTRACT Purpose Magnetization transfer (MT) and water exchange via permeability operate on a similar spatiotemporal scale to water diffusion. In this study, we use a simulation‐based approach to characterize how MT and permeability impact (1) diffusion‐weighted MRI (dMRI) measurements from cylindrical substrates and (2) parameter estimation using a ...
Zhiyu Zheng +3 more
wiley +1 more source
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy +3 more
doaj +1 more source
MR Spectroscopy Without Water Suppression Using the Gradient Impulse Response Function
ABSTRACT Purpose Non‐water‐suppressed proton spectroscopy, 1H‐MRS, is desirable, as retaining the strong water resonance can facilitate automated online data corrections, internal concentration referencing, and monitoring of line narrowing effects in functional MRS.
James B. Bacon +2 more
wiley +1 more source
Multicollision attacks and generalized iterated hash functions
We apply combinatorics on words to develop an approach to multicollisions in generalized iterated hash functions. Our work is based on the discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir.
Kortelainen Juha +2 more
doaj +1 more source
GABA+‐Edited Magnetic Resonance Spectroscopy Deep Learning Quality Assessment Framework
ABSTRACT Purpose Motivated by the need to improve GABA+‐edited magnetic resonance spectroscopy (MRS) quality, we developed a three‐module framework to improve transient averaging based on quality. We hypothesized that training a deep learning (DL) model to differentiate spectrum quality could improve transient averaging compared to traditional ...
Hanna Bugler +2 more
wiley +1 more source
Solving for Blameless and Optimal Control Under Prioritized Safety Constraints
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek +3 more
wiley +1 more source
ABSTRACT Primary brain tumors are life‐threatening diseases. Glioblastoma is the most aggressive type with a poor prognosis. Medulloblastoma is the most common pediatric brain tumor. While surgical treatments often result in recurrences owing to the complex nature of the tumor microenvironment, conventional treatments lower the quality of life of ...
Ilkay Irem Ozbek +3 more
wiley +1 more source
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model.
Qing Zhou +3 more
doaj +1 more source

