Results 41 to 50 of about 23,863 (307)

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +1 more source

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

open access: yesCyber Security and Applications, 2023
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj   +1 more source

NAD⁺ Reduction in Glutamatergic Neurons Induces Lipid Catabolism and Neuroinflammation in the Brain via SARM1

open access: yesAdvanced Science, EarlyView.
NAD⁺ homeostasis maintains neuronal integrity through opposing actions of NMNAT2 and SARM1. Loss of NMNAT2 in glutamatergic neurons reprograms cortical metabolism from glucose to lipid catabolism, depletes lipid stores, and triggers inflammation and neurodegeneration.
Zhen‐Xian Niou   +9 more
wiley   +1 more source

Hyperdimensional hashing

open access: yesProceedings of the 59th ACM/IEEE Design Automation Conference, 2022
Most cloud services and distributed applications rely on hashing algorithms that allow dynamic scaling of a robust and efficient hash table. Examples include AWS, Google Cloud and BitTorrent. Consistent and rendezvous hashing are algorithms that minimize key remapping as the hash table resizes.
Heddes, Mike   +4 more
openaire   +2 more sources

Targeting the CMKLR1‐Mediated Signaling Rebalances Immunometabolism State in Middle‐Age Testicular Macrophages

open access: yesAdvanced Science, EarlyView.
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu   +10 more
wiley   +1 more source

Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System

open access: yesGong-kuang zidonghua, 2012
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj  

A hashing technique using separate binary tree

open access: yesData Science Journal, 2006
It is always a major demand to provide efficient retrieving and storing of data and information in a large database system. For this purpose, many file organization techniques have already been developed, and much additional research is still going on ...
Md Mehedi Masud   +3 more
doaj   +1 more source

Reference‐Guided Chromosome‐by‐Chromosome de novo Assembly at Scale Using Low‐Coverage High‐Fidelity Long‐Reads with HiFiCCL

open access: yesAdvanced Science, EarlyView.
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang   +9 more
wiley   +1 more source

OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM

open access: yesTongxin xuebao, 2016
In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large
Chun-qiang LI   +2 more
doaj   +2 more sources

Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides

open access: yesAdvanced Science, EarlyView.
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy