Results 71 to 80 of about 170,367 (287)

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Instance-Aware Hashing for Multi-Label Image Retrieval

open access: yes, 2016
Similarity-preserving hashing is a commonly used method for nearest neighbour search in large-scale image retrieval. For image retrieval, deep-networks-based hashing methods are appealing since they can simultaneously learn effective image ...
Lai, Hanjiang   +4 more
core   +1 more source

Simple Access to a Series of Higher Substituted Pentafluoroorthotellurate‐Based Silanes

open access: yesChemistry – A European Journal, EarlyView.
The pentafluoroorthotellurate ligand was introduced to organo silanes. A variety of silanes with the formular RxSi(OTeF5)4–x were synthesized and characterized via spectroscopic techniques and sc‐XRD. The influence of the number of OTeF5 groups on structural properties as well as the fluoride ion affinities (FIA) has been studied and compared to other ...
Friederike Oesten   +7 more
wiley   +1 more source

Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map

open access: yesMathematics
For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height.
Mingrui Qi, Dongdong Wang
doaj   +1 more source

An Improved Hashing Approach for Biological Sequence to Solve Exact Pattern Matching Problems

open access: yesApplied Computational Intelligence and Soft Computing, 2023
Pattern matching algorithms have gained a lot of importance in computer science, primarily because they are used in various domains such as computational biology, video retrieval, intrusion detection systems, and fraud detection.
Prince Mahmud   +2 more
doaj   +1 more source

Video retrieval based on deep convolutional neural network

open access: yes, 2017
Recently, with the enormous growth of online videos, fast video retrieval research has received increasing attention. As an extension of image hashing techniques, traditional video hashing methods mainly depend on hand-crafted features and transform the ...
Dong, Yj, Li, JG
core   +1 more source

Annual Banned‐Substance Review 18th Edition—Analytical Approaches in Human Sports Drug Testing 2024/2025

open access: yesDrug Testing and Analysis, EarlyView.
New insights into drug metabolism, distribution, elimination, and detection assays for drugs and methods of sports doping published between 2024 and 2025 are critically reviewed and evaluated in context with the Prohibited List 2025 as established by the World Anti‐Doping Agency.
Mario Thevis, Tiia Kuuranne, Hans Geyer
wiley   +1 more source

Towards Optimal Discrete Online Hashing with Balanced Similarity

open access: yes, 2019
When facing large-scale image datasets, online hashing serves as a promising solution for online retrieval and prediction tasks. It encodes the online streaming data into compact binary codes, and simultaneously updates the hash functions to renew codes ...
Ji, Rongrong   +5 more
core   +1 more source

Term Spread Volatility as a Leading Indicator of Economic Activity

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT In this paper, we examine the macroeconomic predictive power of the volatility of the US Treasury yield curve slope (term spread volatility). Our forecasting exercise shows that US term spread volatility has significant predictive power for US industrial production and employment growth.
Anastasios Megaritis   +3 more
wiley   +1 more source

Can There Be a Two Way Hash Function?

open access: yesIEEE Access
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj   +1 more source

Home - About - Disclaimer - Privacy