Results 71 to 80 of about 167,829 (332)

More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function

open access: yes, 2015
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core   +1 more source

Performance Investigation of Eco‐Friendly Refrigerant Mixtures as an Alternative to R134a in Vapour‐Compression Refrigeration System

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley   +1 more source

A Distance-Encoded Bloom Filter for Fast NDN Name Lookup

open access: yesApplied Sciences
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj   +1 more source

Accurate querying of frequent subgraphs in power grid graph data

open access: yesGlobal Energy Interconnection, 2019
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou   +3 more
doaj   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search

open access: yes, 2018
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni   +12 more
core   +1 more source

Confirmation of a Non‐Transiting Planet in the Habitable Zone of the Nearby M Dwarf L 98‐59

open access: yesAstronomische Nachrichten, EarlyView.
ABSTRACT Only 40 exoplanetary systems with five or more planets are currently known. These systems are crucial for our understanding of planet formation and planet‐planet interaction. The M dwarf L 98‐59 has previously been found to show evidence of five planets, three of which are transiting.
Paul I. Schwarz   +2 more
wiley   +1 more source

A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus

open access: yes, 2020
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing.
Allgood, Nicholas R.   +1 more
core  

A class of structured P2P systems supporting browsing [PDF]

open access: yes, 2009
Browsing is a way of finding documents in a large amount of data which is complementary to querying and which is particularly suitable for multimedia documents.
Cohen, Julien
core   +2 more sources

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy