Results 141 to 150 of about 147,726 (298)
Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen
Dermawan Lumban Toruan
openalex +2 more sources
Scaling Invariant Generation Using State Space Embeddings and GPU Streaming
ABSTRACT The formal verification of railway control systems can ensure the safety of complex scheme plans through techniques such as induction‐based model checking. While inductive verification performs well in complex settings, it often produces false positives due to its consideration of transitions from unreachable safe states to unsafe states ...
Ben Lloyd‐Roberts +4 more
wiley +1 more source
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng +4 more
wiley +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos +10 more
wiley +1 more source
Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio
Rezky M. Nasution
openalex +2 more sources
Abstract Klebsiella pneumoniae is a Gram‐negative opportunistic pathogen responsible for a wide range of community‐associated and hospital‐acquired infections and a major cause of neonatal sepsis in low‐ and middle‐income countries. The pathogen's surface fimbriae, particularly the Type 3 fimbriae, are critical for bacterial adhesion, biofilm formation,
Valentina Monaci +5 more
wiley +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
Determination of the Optimal Window Size for the Spatial XOR Filter
ABSTRACT Introduction An XOR filter is a probabilistic data structure representing a set of keys for membership queries. Given a set X⊂𝒰 of n$$ n $$ keys, and hash functions h1,…,hk:𝒰→{1,…,m}, the filter relies on filling in an array H[1,…,m]$$ H\left[1,\dots, m\right] $$ such that, for all x∈X$$ x\in X $$, h1(x)⊕⋯⊕hk(x)$$ {h}_1(x)\oplus \cdots \oplus {
Paulo Diogo Rodrigues Leão +2 more
wiley +1 more source
wholeskim: Utilising Genome Skims for Taxonomically Annotating Ancient DNA Metagenomes
ABSTRACT Inferring community composition from shotgun sequencing of environmental DNA is highly dependent on the completeness of reference databases used to assign taxonomic information as well as the pipeline used. While the number of complete, fully assembled reference genomes is increasing rapidly, their taxonomic coverage is generally too sparse to
Lucas Elliott +5 more
wiley +1 more source

