Results 71 to 80 of about 13,015 (291)

Phenobot: An Autodigital Modeling System for in situ Phenotyping in Horticulture

open access: yesAdvanced Intelligent Systems, EarlyView.
This study introduces a robotic phenotyping system for precision agriculture, integrating environmental understanding, motion planning, and in situ plant phenotyping. The system autonomously navigates through real‐world agricultural environments, collects high‐quality plant data, and reconstructs accurate 3D plant models. Results demonstrate the system'
Kewei Hu   +5 more
wiley   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

Sustainability‐inspired upcycling of organophosphorus pollutants into phosphatic fertilizer on continuous‐flow reactor

open access: yesAngewandte Chemie International Edition, Accepted Article.
With the increasing requirement for phosphorus resources and their shortage in nature, cyclic utilization of organophosphorus pollutants into phosphatic fertilizer might offer a sustainable approach to achieve the recycling of phosphorus. Herein, we first report the selective degradation of organophosphorus pollutants (such as HEDP and glyphosate), via
Zangli Li   +9 more
wiley   +1 more source

Using a combination of midazolam and butorphanol is a safe and effective reversible field sedation protocol for Weddell seal (Leptonychotes weddellii) pups

open access: yesVeterinary Record, Volume 191, Issue 11, 3/10 December 2022., 2022
Abstract Background Weddell seals (Leptonychotes weddellii) are a well‐studied species of phocid with an apparent sensitivity to immobilising agents. Mortality as high as 31% has been reported during field immobilisation. This study investigated the use of a benzodiazepine in combination with an opioid agonist/antagonist for sedation in Weddell seal ...
Sophie Whoriskey   +6 more
wiley   +1 more source

A Fast Single-Key Two-Level Universal Hash Function

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty   +2 more
doaj   +1 more source

A Needle in a Haystack: Landscape Survey and Archaeological Detection Experiments in Apalachee Bay

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT This paper presents the results of a pilot landscape‐scale seismic survey undertaken in Apalachee Bay, Florida, across a submerged landscape that contains dozens of Pre‐Contact sites. In addition to the goals of improving the geophysical and remote sensing ground model for this submerged landscape, the survey also sought to undertake the first
Simon Fitch, Jessica Cook Hale
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Open problems in hash function security [PDF]

open access: yesDesigns, Codes and Cryptography, 2015
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode of operation, and the compression function itself is often designed from block ciphers or permutations.
Andreeva, Elena   +2 more
openaire   +2 more sources

Fast hash functions and convolution product

open access: yesJournal of Mathematical Cryptology, 2014
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj   +1 more source

Home - About - Disclaimer - Privacy