Results 1 to 10 of about 600,761 (285)

Graph-based vision transformer with sparsity for training on small datasets from scratch [PDF]

open access: yesScientific Reports
Vision Transformers (ViTs) have achieved impressive results in large-scale image classification. However, when training from scratch on small datasets, there is still a significant performance gap between ViTs and Convolutional Neural Networks (CNNs ...
Peng Li   +4 more
doaj   +2 more sources

KEYS, LOCKING MECHANISMS AND PADLOCKS FROM THE OLD COLLECTIONS OF THE NATIONAL MUSEUM OF BANAT, FROM POJEJENA AND TIBISCUM [PDF]

open access: yesAnalele Banatului. Arheologie-Istorie, 2023
The artefacts discussed in this article are related to keeping the privacy or security of properties and goods (keys, locking mechanisms, storage furniture, padlocks, handcuffs, some types of chains etc.).
Bogdan Lăpușan
doaj   +1 more source

Seismic Performance of seat-type bridges with elastomeric bearings [PDF]

open access: yesNumerical Methods in Civil Engineering, 2021
In Iran and some other countries, elastomer bearings in seat-type bridges are used with no sole/masonry plates and there is no positive connection between superstructure and substructure.
Mohammad Barkhordary, Saeed Tariverdilo
doaj   +1 more source

CTIDH: faster constant-time CSIDH

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a new key space for CSIDH and a new algorithm for constant-time evaluation of the CSIDH group action. The key space is not useful with previous algorithms, and the algorithm is not useful with previous key spaces, but combining the ...
Gustavo Banegas   +7 more
doaj   +1 more source

Keys to Successfully Choosing Enterprises That Suit Your Small Farm

open access: yesEDIS, 2008
HS-1121, an 11-page fact sheet by Robert Hochmuth, Larry Halsey, George Hochmuth, Chad Hutchinson, and Linda Landrum, helps farmers begin the decision-making process of evaluating alternative enterprises.
Robert Hochmuth   +4 more
doaj   +5 more sources

Special Subsets of Addresses for Blockchains Using the secp256k1 Curve

open access: yesMathematics, 2022
In 2020, Sala, Sogiorno and Taufer were able to find the private keys of some Bitcoin addresses, thus being able to spend the cryptocurrency linked to them.
Antonio J. Di Scala   +3 more
doaj   +1 more source

An Authenticated Key Agreement Scheme for Wireless Sensor Networks

open access: yesJournal of Sensor and Actuator Networks, 2014
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the private keys in each node.
Mee Loong Yang   +2 more
doaj   +1 more source

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE

open access: yesSensors, 2021
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that
Rinki Rani   +7 more
doaj   +1 more source

Electronic identification keys for species with cryptic morphological characters: a feasibility study using some Thesium species [PDF]

open access: yesPhytoKeys, 2021
The popularity of electronic identification keys for species identification has increased with the rapid technological advancements of the 21st century.
Natasha Lombard   +2 more
doaj   +3 more sources

Clinical assessment of heartworm‐infected Beagles treated with a combination of imidacloprid/moxidectin and doxycycline, or untreated

open access: yesJournal of Veterinary Internal Medicine, 2020
Background Administration of moxidectin topically and doxycycline PO has been utilized experimentally as an alternative treatment for heartworm disease. However, clinical effects of this protocol remain poorly characterized.
Molly D. Savadelis   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy