Results 41 to 50 of about 123,825 (281)

Perceived Impacts and Predictors of Cannabis Products used by Rheumatology Patients in Alberta: A Multivariable Analysis of Cross‐sectional Survey Data

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to characterize cannabis product choices (cannabinoid content and formulation) among rheumatology patients, and their associations with patient factors, patient reported perceived side effects and positive impacts. Methods An online survey (delivered from March to November 2022) was distributed by Alberta Health Services to ...
Susan Zhang   +10 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

Perceptual Audio Hashing Functions

open access: yesEURASIP Journal on Advances in Signal Processing, 2005
Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document.
Emin Anarım   +3 more
doaj   +1 more source

ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION

open access: yesСовременные информационные технологии и IT-образование, 2018
Classical approaches to the construction of hash function modes, based on the using of iterative procedures, do not allow efficient processing of large amounts of data and can’t be adapted to parallel computing architectures.
Dmitriy S. Bogdanov   +2 more
doaj   +1 more source

Purpose‐Adaptable Reinforced 3D Hyaluronic‐Acid Based Platform to Study Pathomechanisms of the Central Nervous System

open access: yesAdvanced Healthcare Materials, EarlyView.
Platform system to create biofabricated 3D spinal cord tissue models: Combining high resolution PCL fiber placement, a customized, hyaluronic acid‐based hydrogel, two cell types (spinal cord neurons and astrocytes) together with three distinct laminin isoforms allow the formation of functional cell–cell network interactions.
Nicoletta Murenu   +12 more
wiley   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Bottom‐Up Programming of Cell States in Cancer Organoids with Defined Synthetic Adhesion Cues

open access: yesAdvanced Materials, EarlyView.
A bottom‐up biomaterial platform is developed to program transcriptomic states in pancreatic cancer organoids by tuning adhesion cues within synthetic matrices. By combining a Design of Experiments framework with multiobjective optimization, matrix compositions are identified that enrich specific cellular programs like EMT.
Ali Nadernezhad   +6 more
wiley   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

From Graphs to Keyed Quantum Hash Functions [PDF]

open access: yes, 2016
We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them.
Ziatdinov, Mansur
core   +2 more sources

Home - About - Disclaimer - Privacy