Results 41 to 50 of about 13,015 (291)

Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells

open access: yesProgress in Photovoltaics: Research and Applications, EarlyView., 2023
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel   +11 more
wiley   +1 more source

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Universal hash functions from quantum procedures

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2020
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to create insufficiently accurate quantum computers with low computing power.
F.M. Ablayev, M.T. Ziatdinov
doaj   +1 more source

Germline variants in CDKN2A wild‐type melanoma prone families

open access: yesMolecular Oncology, EarlyView.
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen   +5 more
wiley   +1 more source

Real World Applications of MGR, Neeva and KN-Hash

open access: yesJournal of Applied Computer Science & Mathematics, 2018
Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started using in almost every branch of ...
Khushboo BUSSI   +2 more
doaj   +1 more source

Hash Function Based on Controlled Alternate Quantum Walks With Memory (September 2021)

open access: yesIEEE Transactions on Quantum Engineering, 2022
We propose a Quantum inspired Hash Function using controlled alternate quantum walks with Memory on cycles (QHFM), where the $j$th message bit decides whether to run quantum walk with one-step memory or to run quantum walk with two-step memory at the $j ...
Qing Zhou, Songfeng Lu
doaj   +1 more source

The breaking of the AR Hash Function [PDF]

open access: yesDAIMI Report Series, 1993
<p>The AR hash function has been proposed by <em> Algorithmic Research Ltd</em>. It has been circulated in the ISO community (Working group 2, document WG2/N179), and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode.
Damgård, Ivan Bjerre   +1 more
openaire   +5 more sources

Evaluating the use of diagnostic CT with flattening filter free beams for palliative radiotherapy: Dosimetric impact of scanner calibration variability

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose Palliative radiotherapy comprises a significant portion of the radiation treatment workload. Volumetric‐modulated arc therapy (VMAT) improves dose conformity and, in conjunction with flattening filter free (FFF) delivery, can decrease treatment times, both of which are desirable in a population with a high probability of retreatment ...
Madeleine L. Van de Kleut   +2 more
wiley   +1 more source

A Workflow‐Centric Approach to Generating FAIR Data Objects for Computationally Generated Microstructure‐Sensitive Mechanical Data

open access: yesAdvanced Engineering Materials, EarlyView.
A novel metadata schema is introduced to address the sparsity of microstructure‐sensitive mechanical data. The design follows the material modeling workflow, as each run results in the definition of unique data objects. The schema includes categorical elements to ensure findability, accessibility, interoperability, and reusability (FAIR). This approach
Ronak Shoghi, Alexander Hartmaier
wiley   +1 more source

ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION

open access: yesСовременные информационные технологии и IT-образование, 2018
Classical approaches to the construction of hash function modes, based on the using of iterative procedures, do not allow efficient processing of large amounts of data and can’t be adapted to parallel computing architectures.
Dmitriy S. Bogdanov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy