Results 51 to 60 of about 11,893 (260)
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley +1 more source
A Fast Single-Key Two-Level Universal Hash Function
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty +2 more
doaj +1 more source
Blockchain Technology and the Circular Economy Transition: Associations With Company Performance
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach +3 more
wiley +1 more source
Fast hash functions and convolution product
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl +3 more
doaj +1 more source
Simple Access to a Series of Higher Substituted Pentafluoroorthotellurate‐Based Silanes
The pentafluoroorthotellurate ligand was introduced to organo silanes. A variety of silanes with the formular RxSi(OTeF5)4–x were synthesized and characterized via spectroscopic techniques and sc‐XRD. The influence of the number of OTeF5 groups on structural properties as well as the fluoride ion affinities (FIA) has been studied and compared to other ...
Friederike Oesten +7 more
wiley +1 more source
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir +4 more
doaj +1 more source
Straight to Phase III: Model‐informed approach speeds depemokimab clinical development in interleukin‐5‐driven diseases. IL‐5, a key mediator of type 2 inflammation, underlies various diseases, including severe asthma, CRSwNP, EGPA, and HES. Reduction in blood eosinophil count (BEC), a biomarker of IL‐5 activity, is commonly used to evaluate the ...
Chiara Zecchin +6 more
wiley +1 more source

