Results 41 to 50 of about 11,893 (260)
Machine Learning for Green Solvents: Assessment, Selection and Substitution
Environmental regulations have intensified demand for green solvents, but discovery is limited by Solvent Selection Guides (SSGs) that quantify solvent sustainability. Training a machine learning model on GlaxoSmithKline SSG, a database of sustainability metrics for 10,189 solvents, GreenSolventDB is developed. Integrated with Hansen solubility metrics,
Rohan Datta +4 more
wiley +1 more source
Indifferentiable hash functions in the standard model
Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it is often overlooked that such considerations only hold in the random oracle model and do not ...
Juha Partala
doaj +1 more source
Hash Function Based on Controlled Alternate Quantum Walks With Memory (September 2021)
We propose a Quantum inspired Hash Function using controlled alternate quantum walks with Memory on cycles (QHFM), where the $j$th message bit decides whether to run quantum walk with one-step memory or to run quantum walk with two-step memory at the $j ...
Qing Zhou, Songfeng Lu
doaj +1 more source
Neural Fields for Highly Accelerated 2D Cine Phase Contrast MRI
ABSTRACT 2D cine phase contrast (CPC) MRI provides quantitative information on blood velocity and flow within the human vasculature. However, data acquisition is time‐consuming, motivating the reconstruction of the velocity field from undersampled measurements to reduce scan times. In this work, neural fields are proposed as a continuous spatiotemporal
Pablo Arratia +7 more
wiley +1 more source
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which
Yunlong Zhang +3 more
doaj +1 more source
Dorsal Raphe VIP Neurons Are Critical for Survival‐Oriented Vigilance
DRNVIP neurons in mice and primates are strategically positioned to influence the central extended amygdala via feedback loops. They regulate the excitability of PKC‐δ neurons in the ovBNST and CeA through glutamate release. Their ablation heightens activity in these regions, disrupts active‐phase sleep architecture, enhances risk assessment behaviors ...
Adriane Guillaumin +15 more
wiley +1 more source
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova +3 more
doaj +1 more source
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng +4 more
wiley +1 more source
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee +5 more
doaj +1 more source
: In this work, Voxel‐SLAM (simultaneous localization and mapping) is introduced: a complete, accurate, and versatile LiDAR (light detection and ranging) ‐inertial SLAM system consisting of five modules: initialization, odometry, local mapping (LM), loop closure (LC), and global mapping (GM), all employing the same map representation, an adaptive voxel
Zheng Liu +9 more
wiley +1 more source

