Results 71 to 80 of about 11,893 (260)

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

Quantifying Structural Complexity, Effort, and Performance: An Early Experiment Using Network Design Tasks

open access: yesSystems Engineering, EarlyView.
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza   +3 more
wiley   +1 more source

Illicit Drug‐Derived Volatile Organic Compounds as Markers for Application in Noncontact Detection Technology

open access: yesThe Chemical Record, EarlyView.
This review highlights the characteristic odor markers of illicit drugs, emphasizing volatile markers from both natural and synthetic sources, and explores the shift from canine‐based detection to emerging noncontact sensing technologies. Illicit drug use remains a global concern, requiring effective detection methods to counter evolving concealment ...
Minwoo Kim   +4 more
wiley   +1 more source

Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

open access: yesApplied Sciences
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin   +1 more
doaj   +1 more source

Online Supervised Sketching Hashing for Large-Scale Image Retrieval

open access: yesIEEE Access, 2019
Online hashing methods have achieved a good tradeoff between the accuracy and the efficiency for learning the hash functions in the online settings. Compared to the stochastic gradient descent-based online hashing methods, the data sketching-based online
Zhenyu Weng, Yuesheng Zhu
doaj   +1 more source

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

Trustworthy Federated Learning for Industrial IoT: Balancing Robustness and Fairness via Blockchain‐Based Reputation

open access: yesArtificial Intelligence for Engineering, EarlyView.
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley   +1 more source

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

Multicollision attacks and generalized iterated hash functions

open access: yesJournal of Mathematical Cryptology, 2010
We apply combinatorics on words to develop an approach to multicollisions in generalized iterated hash functions. Our work is based on the discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir.
Kortelainen Juha   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy