Results 71 to 80 of about 13,015 (291)
Phenobot: An Autodigital Modeling System for in situ Phenotyping in Horticulture
This study introduces a robotic phenotyping system for precision agriculture, integrating environmental understanding, motion planning, and in situ plant phenotyping. The system autonomously navigates through real‐world agricultural environments, collects high‐quality plant data, and reconstructs accurate 3D plant models. Results demonstrate the system'
Kewei Hu+5 more
wiley +1 more source
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl+3 more
doaj +1 more source
With the increasing requirement for phosphorus resources and their shortage in nature, cyclic utilization of organophosphorus pollutants into phosphatic fertilizer might offer a sustainable approach to achieve the recycling of phosphorus. Herein, we first report the selective degradation of organophosphorus pollutants (such as HEDP and glyphosate), via
Zangli Li+9 more
wiley +1 more source
Abstract Background Weddell seals (Leptonychotes weddellii) are a well‐studied species of phocid with an apparent sensitivity to immobilising agents. Mortality as high as 31% has been reported during field immobilisation. This study investigated the use of a benzodiazepine in combination with an opioid agonist/antagonist for sedation in Weddell seal ...
Sophie Whoriskey+6 more
wiley +1 more source
A Fast Single-Key Two-Level Universal Hash Function
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty+2 more
doaj +1 more source
Analysis of hash function of Yi and Lam
A block cipher based hash function of Yi and Lam is analysed and shown to be significantly weaker than originally intended.
Martin, Keith M., Mitchell, Chris J
openaire +10 more sources
A Needle in a Haystack: Landscape Survey and Archaeological Detection Experiments in Apalachee Bay
ABSTRACT This paper presents the results of a pilot landscape‐scale seismic survey undertaken in Apalachee Bay, Florida, across a submerged landscape that contains dozens of Pre‐Contact sites. In addition to the goals of improving the geophysical and remote sensing ground model for this submerged landscape, the survey also sought to undertake the first
Simon Fitch, Jessica Cook Hale
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan+7 more
wiley +1 more source
Open problems in hash function security [PDF]
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode of operation, and the compression function itself is often designed from block ciphers or permutations.
Andreeva, Elena+2 more
openaire +2 more sources
Fast hash functions and convolution product
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj +1 more source