Results 111 to 120 of about 1,628,666 (344)

Integrating target capture with whole genome sequencing of recent and natural history collections to explain the phylogeography of wild‐growing and cultivated cannabis

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Cannabis has been used by humans for millennia, resulting in diverse landraces and uses. Its complex legal status and economic importance make sampling wild‐growing populations difficult, limiting past studies to modern cultivars with low genetic diversity. Our research provides crucial insights into the genetic diversity of wild‐growing and cultivated
Manica Balant   +19 more
wiley   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Understanding the Association Between Bitcoin Mining and Environmental Sustainability in Light of the Sustainable Development Goals Through the DARDL and KRLS Methods

open access: yesSustainable Development, EarlyView.
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley   +1 more source

A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus

open access: yes, 2020
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing.
Allgood, Nicholas R.   +1 more
core  

FSL-BM: Fuzzy Supervised Learning with Binary Meta-Feature for Classification

open access: yes, 2017
This paper introduces a novel real-time Fuzzy Supervised Learning with Binary Meta-Feature (FSL-BM) for big data classification task. The study of real-time algorithms addresses several major concerns, which are namely: accuracy, memory consumption, and ...
CP Chen   +15 more
core   +1 more source

Laser Synthesis in Liquid Induced Lattice Distortion in PtFeSn/Activated Carbon for Enhanced Methylcyclohexane Dehydrogenation

open access: yesSmall Methods, EarlyView.
A Pt‐Fe‐Sn alloy catalyst supported on activated carbon is synthesized via laser synthesis in liquid, introducing lattice distortions that enhance active site exposure and toluene desorption. The catalyst achieves a hydrogen evolution rate of 2625 mmol gPt⁻¹ min⁻¹ with 99.96% selectivity and excellent stability, offering a promising strategy for ...
Zheng Wang   +5 more
wiley   +1 more source

CAR:a P2P content addressable andauto-retrievable algorithm for MANET

open access: yesTongxin xuebao, 2011
To be directed at the unique features of mobile ad-hoc network(MANET) environment,a kind of mobile P2P(MP2P) index structure.Geographic-information-based hierarchical hash index structure(GH2I),was presented based on DHT(Distributed Hash Table).On the ...
WU Hua-feng1   +2 more
doaj   +2 more sources

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core  

A Comprehensive Review of ns‐3‐Based Simulation Frameworks for LEO Satellite Constellations: Capabilities and Limitations

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Low Earth Orbit (LEO) satellite constellations are redefining the concept of global connectivity, opening up a new world of opportunities for communication services and applications. Purpose The emergence of LEO satellites (SATs) is ushering in a new era of innovation, where new complex technologies are being developed, and the use ...
Pilar Manzanares‐Lopez   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy