Results 71 to 80 of about 1,628,666 (344)

A hashing technique using separate binary tree

open access: yesData Science Journal, 2006
It is always a major demand to provide efficient retrieving and storing of data and information in a large database system. For this purpose, many file organization techniques have already been developed, and much additional research is still going on ...
Md Mehedi Masud   +3 more
doaj   +1 more source

Annual Banned‐Substance Review 17th Edition—Analytical Approaches in Human Sports Drug Testing 2023/2024

open access: yesDrug Testing and Analysis, EarlyView.
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario  Thevis   +2 more
wiley   +1 more source

Finding succinct ordered minimal perfect hashing functions [PDF]

open access: yes, 1992
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core  

Infant Death due to Cannabis Ingestion

open access: yesDrug Testing and Analysis, EarlyView.
ABSTRACT A child died in the emergency room of a local hospital a few hours after ingesting a substance the color of cork and the consistency of earth. At home, a modest amount of resinous substance was found. At the hospital, the child exhibited alterations in walking, balance, and consciousness.
Donata Favretto   +9 more
wiley   +1 more source

More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function

open access: yes, 2015
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core   +1 more source

Dynamic riskscapes for prey: disentangling the impact of human and cougar presence on deer behavior using GPS smartphone locations

open access: yesEcography, EarlyView.
Prey species adjust their behavior along human‐use gradients by balancing risks from predators and humans. During hunting seasons, prey often exhibit strong antipredator responses to humans but may develop tolerance in suburban areas to exploit human‐mediated resources.
Heather N. Abernathy   +8 more
wiley   +1 more source

OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM

open access: yesTongxin xuebao, 2016
In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large
Chun-qiang LI   +2 more
doaj   +2 more sources

Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System

open access: yesGong-kuang zidonghua, 2012
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj  

In‐hospital and 1 year incremental prognostic value of drug abuse detection in acute heart failure

open access: yesESC Heart Failure, EarlyView.
Abstract Aims The study aims to assess the in‐hospital and 1 year incremental prognostic value of recent drug abuse use, detected by a systematic urinary screening, in a consecutive cohort of patients hospitalized for acute heart failure (AHF). Methods All patients admitted for AHF with a drug abuse screening using a urinary assay were included in this
Charles Fauvel   +110 more
wiley   +1 more source

Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval

open access: yes, 2010
In this work we have compared two indexing algorithms that have been used to index and retrieve Carnatic music songs. We have compared a modified algorithm of the Dual ternary indexing algorithm for music indexing and retrieval with the multi-key hashing
Amudha, A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy