Academic literature on the topic 'HASH METHODS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'HASH METHODS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "HASH METHODS"

1

Safaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, and Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.

Full text
Abstract:
Abstract This article discusses the issues related to the possibility of realization of collision cyberattacks (based on hash collisions). Since post–quantum cryptography has become relevant, classical cryptosystems do not provide the sufficient resistance to the modern quantum cyberattacks. Systems based on outdated hashing algorithms become vulnerable to cyberattacks with hash collision. As replacement for unreliable algorithms, such as various modifications of MD5 and SHA–1, new algorithms have been created, for example, SHA–3 standard based on the Keccak function and AES–based hashing. This article discusses modern collision cyberattacks and possible methods of their detection. Because of this study, theoretical description of cyberattacks with hash collision was considered; modern cyberattacks on hash collisions and possible ways of detecting and countering them (weak hash detection) are described; software tool that detects vulnerable and unreliable hash is implemented; software testing is carried out. Based on the conducted research, it can be concluded that the main advantages of implementing software tool are effective detection of vulnerable hash, the ability to generate new hash protected from collisions, convenient and user– friendly interface, small memory requirements and small size of the program code.
APA, Harvard, Vancouver, ISO, and other styles
2

Blackburn, Simon R. "Perfect Hash Families: Probabilistic Methods and Explicit Constructions." Journal of Combinatorial Theory, Series A 92, no. 1 (October 2000): 54–60. http://dx.doi.org/10.1006/jcta.1999.3050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.

Full text
Abstract:
Parallel best-first search algorithms such as Hash Distributed A* (HDA*) distribute work among the processes using a global hash function. We analyze the search and communication overheads of state-of-the-art hash-based parallel best-first search algorithms, and show that although Zobrist hashing, the standard hash function used by HDA*, achieves good load balance for many domains, it incurs significant communication overhead since almost all generated nodes are transferred to a different processor than their parents. We propose Abstract Zobrist hashing, a new work distribution method for parallel search which, instead of computing a hash value based on the raw features of a state, uses a feature projection function to generate a set of abstract features which results in a higher locality, resulting in reduced communications overhead. We show that Abstract Zobrist hashing outperforms previous methods on search domains using hand-coded, domain specific feature projection functions. We then propose GRAZHDA*, a graph-partitioning based approach to automatically generating feature projection functions. GRAZHDA* seeks to approximate the partitioning of the actual search space graph by partitioning the domain transition graph, an abstraction of the state space graph. We show that GRAZHDA* outperforms previous methods on domain-independent planning.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Xingbo, Xiushan Nie, Yingxin Wang, and Yilong Yin. "Jointly Multiple Hash Learning." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9981–82. http://dx.doi.org/10.1609/aaai.v33i01.33019981.

Full text
Abstract:
Hashing can compress heterogeneous high-dimensional data into compact binary codes while preserving the similarity to facilitate efficient retrieval and storage, and thus hashing has recently received much attention from information retrieval researchers. Most of the existing hashing methods first predefine a fixed length (e.g., 32, 64, or 128 bit) for the hash codes before learning them with this fixed length. However, one sample can be represented by various hash codes with different lengths, and thus there must be some associations and relationships among these different hash codes because they represent the same sample. Therefore, harnessing these relationships will boost the performance of hashing methods. Inspired by this possibility, in this study, we propose a new model jointly multiple hash learning (JMH), which can learn hash codes with multiple lengths simultaneously. In the proposed JMH method, three types of information are used for hash learning, which come from hash codes with different lengths, the original features of the samples and label. In contrast to the existing hashing methods, JMH can learn hash codes with different lengths in one step. Users can select appropriate hash codes for their retrieval tasks according to the requirements in terms of accuracy and complexity. To the best of our knowledge, JMH is one of the first attempts to learn multi-length hash codes simultaneously. In addition, in the proposed model, discrete and closed-form solutions for variables can be obtained by cyclic coordinate descent, thereby making the proposed model much faster during training. Extensive experiments were performed based on three benchmark datasets and the results demonstrated the superior performance of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
5

Fitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification." Journal of Imaging 7, no. 3 (March 8, 2021): 48. http://dx.doi.org/10.3390/jimaging7030048.

Full text
Abstract:
Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user’s cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature.
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (April 30, 2019): 449. http://dx.doi.org/10.3390/e21050449.

Full text
Abstract:
Person re-identification in the image processing domain has been a challenging research topic due to the influence of pedestrian posture, background, lighting, and other factors. In this paper, the method of harsh learning is applied in person re-identification, and we propose a person re-identification method based on deep hash learning. By improving the conventional method, the method proposed in this paper uses an easy-to-optimize shallow convolutional neural network to learn the inherent implicit relationship of the image and then extracts the deep features of the image. Then, a hash layer with three-step calculation is incorporated in the fully connected layer of the network. The hash function is learned and mapped into a hash code through the connection between the network layers. The generation of the hash code satisfies the requirements that minimize the error of the sum of quantization loss and Softmax regression cross-entropy loss, which achieve the end-to-end generation of hash code in the network. After obtaining the hash code through the network, the distance between the pedestrian image hash code to be retrieved and the pedestrian image hash code library is calculated to implement the person re-identification. Experiments conducted on multiple standard datasets show that our deep hashing network achieves the comparable performances and outperforms other hashing methods with large margins on Rank-1 and mAP value identification rates in pedestrian re-identification. Besides, our method is predominant in the efficiency of training and retrieval in contrast to other pedestrian re-identification algorithms.
APA, Harvard, Vancouver, ISO, and other styles
7

Ussatova, О., Ye Begimbayeva, S. Nyssanbayeva, and N. Ussatov. "ANALYSIS OF METHODS AND PRACTICAL APPLICATION OF HASH FUNCTIONS." SERIES PHYSICO-MATHEMATICAL 5, no. 339 (October 15, 2021): 100–110. http://dx.doi.org/10.32014/2021.2518-1726.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

YARMILKO, Аndii, Inna ROZLOMII, and Yuliya MYSIURA. "USAGE OF HASH METHODS IN THE CRYPTOGRAPHIC DATA ANALYSIS." Herald of Khmelnytskyi National University 303, no. 6 (December 2021): 49–54. http://dx.doi.org/10.31891/2307-5732-2021-303-6-49-54.

Full text
Abstract:
The tasks of information security system include identifying potential or actual sources of threat to system’s work and minimizing consequences of unauthorized influence on it. While solving them, arises the need of restoration of the initial state of the information system, especially the data integrity. While performing information message analysis the other task may be finding differences between two data fragments or their instances. This paper offers methods of the complex solution of the information security tasks and the analysis of data streams using the means of cryptography and presents the experience of developing the reliable implementation of these methods. The developed methods allow detecting falsifications in data part of the sent message and restoring the initial message. During the cryptographic analysis, the area of change in a data block is localized using cross hashing which is performed by computing the hash of information message block by block. The result is the program implementation of the offered method of information stream analysis that is based on comparing three frames of input data. The effectiveness of detecting falsifications in a data stream depending on algorithm’s sensitivity was researched with the developed instrument. The dependence of the share of falsifications detected by the system in the information block on the established maximum allowable relative deviation from the median and the properties of the input stream, in particular, the division of the input data into frames, was experimentally revealed. It is expected that the advantages of the method will be higher in the preliminary stage of data flow analysis related to its segmentation before addressing the selected fragments to more accurate and specialized algorithms.
APA, Harvard, Vancouver, ISO, and other styles
9

Long, Jun, Longzhi Sun, Liujie Hua, and Zhan Yang. "Discrete Semantics-Guided Asymmetric Hashing for Large-Scale Multimedia Retrieval." Applied Sciences 11, no. 18 (September 21, 2021): 8769. http://dx.doi.org/10.3390/app11188769.

Full text
Abstract:
Cross-modal hashing technology is a key technology for real-time retrieval of large-scale multimedia data in real-world applications. Although the existing cross-modal hashing methods have achieved impressive accomplishment, there are still some limitations: (1) some cross-modal hashing methods do not make full consider the rich semantic information and noise information in labels, resulting in a large semantic gap, and (2) some cross-modal hashing methods adopt the relaxation-based or discrete cyclic coordinate descent algorithm to solve the discrete constraint problem, resulting in a large quantization error or time consumption. Therefore, in order to solve these limitations, in this paper, we propose a novel method, named Discrete Semantics-Guided Asymmetric Hashing (DSAH). Specifically, our proposed DSAH leverages both label information and similarity matrix to enhance the semantic information of the learned hash codes, and the ℓ2,1 norm is used to increase the sparsity of matrix to solve the problem of the inevitable noise and subjective factors in labels. Meanwhile, an asymmetric hash learning scheme is proposed to efficiently perform hash learning. In addition, a discrete optimization algorithm is proposed to fast solve the hash code directly and discretely. During the optimization process, the hash code learning and the hash function learning interact, i.e., the learned hash codes can guide the learning process of the hash function and the hash function can also guide the hash code generation simultaneously. Extensive experiments performed on two benchmark datasets highlight the superiority of DSAH over several state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Gabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.

Full text
Abstract:
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "HASH METHODS"

1

Kim, Kyung-Mi. "Perfect Hash Families: Constructions and Applications." Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1118.

Full text
Abstract:
Let A and B be finite sets with |A|=n and |B|=m. An (n,m,w)-perfect hash family is a collection F of functions from A to B such that for any XA with |X|=w, there exists at least one ? ∈ F such that ? is one-to-one when restricted to X. Perfect hash families are basic combinatorial structures and they have played important roles in Computer Science in areas such as database management, operating systems, and compiler constructions. Such hash families are used for memory efficient storage and fast retrieval of items such as reserved words in programming languages, command names in interactive systems, or commonly used words in natural languages. More recently, perfect hash families have found numerous applications to cryptography, for example, to broadcast encryption schemes, secret sharing, key distribution patterns, visual cryptography, cover-free families and secure frameproof codes. In this thesis, we survey constructions and applications of perfect hash families. For constructions, we divided the results into three parts, depending on underlying structure and properties of the constructions: combinatorial structures, linear functionals, and algebraic structures. For applications, we focus on those related to cryptography.
APA, Harvard, Vancouver, ISO, and other styles
2

Kaščák, Andrej. "Komprese záznamů o IP tocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235520.

Full text
Abstract:
My Master's thesis deals with the problems of flow compression in network devices. Its outcome should alleviate memory consumption of the flows and simplify the processing of network traffic. As an introduction I provide a description of protocols serving for data storage and manipulation, followed by discussion about possibilities of compression methods that are employed nowadays. In the following part there is an in-depth analysis of source data that shows the structure and composition of the data and brings up useful observations, which are later used in the testing  of existing compression methods, as well as about their potential and utilization in flow compression. Later on, I venture into the field of lossy compression and basing on the test results a new approach is described, created by means of flow clustering and their subsequent lossy compression. The conclusion contains an evaluation of the possibilities of the method and the final summary of the thesis along with various suggestions for further development of the research.
APA, Harvard, Vancouver, ISO, and other styles
3

Resch, Bernd, and Peter Romirer-Maierhofer. "Global Positioning in Harsh Environments." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-282.

Full text
Abstract:

As global location systems offer only restricted availability, they are not suitable for a world-

wide tracking application without extensions. This thesis contains a goods-tracking solution,

which can be considered globally working in contrast to formerly developed technologies. For

the creation of an innovative approach, an evaluation of the previous efforts has to be made.

As a result of this assessment, a newly developed solution is presented in this thesis that uses

the Global Positioning System (GPS) in connection with the database correlation method

involving Global System for Mobile Communications (GSM) fingerprints. The database

entries are generated automatically by measuring numerous GSM parameters such as Cell

Identity and signal strength involving handsets of several different providers and the real

reference position obtained via a high sensitivity GPS receiver.

APA, Harvard, Vancouver, ISO, and other styles
4

Lisø, Kim Robert. "Building Envelope Performance Assessments in Harsh Climates : Methods for Geographically Dependent Design." Doctoral thesis, Norwegian University of Science and Technology, Department of Civil and Transport Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1123.

Full text
Abstract:

The lifetime of the built environment depends strongly on the severity of local climatic conditions. A well-functioning and reliable infrastructure is a precondition for economic growth and social development. The climate and topography of Norway puts great demands on the design and localization of buildings. The relationship between materials, structures and climatic impact is highly complex; illustrating the need for new and improved methods for vulnerability assessment of building envelope performance in relation to externally imposed climatic strains. Historically, major variations in climatic impact have led to corresponding large variations in building practice throughout the country - often well suited to local conditions. Today it is fair to say that sound building traditions and practice to some extent are being rejected in the quest for cost-effective solutions. Furthermore, projected changes in climatic conditions due to global warming will enhance the vulnerability within the built environment.

The primary objectives of the present dissertation are to increase the knowledge about possible impacts of climate change on building envelope performance, and to analyse and update methods for the planning and design of external envelopes in relation to climatic impact. This is accomplished through the development of integrated approaches and improved methods for assessing impacts of external climatic parameters on building envelopes, combining knowledge on materials, structures and relevant climate data, applicable for both historical data and scenarios for climate change. The results will contribute to more accurate building physics design guidelines, promoting high-performance building envelopes in harsh climates.

Approaches to assessments of the risks associated with climate change and buildings are suggested, identifying main areas of vulnerability in the construction industry. It is shown that there are benefits to be gained from the introduction of risk management strategies within a greater extent of the construction industry. A way of analysing the building economics of climate change is also proposed

Analyses of building defects are necessary in order to further develop tools, solutions and preventive measures ensuring high-performance building envelopes. To illuminate the vulnerability of different building envelope elements under varying climatic exposure, a comprehensive analysis of empirical data gathered from process induced building defect assignments is carried out. The amount of building defects in Norway clearly illustrates that it is not only the extreme weather events that need to be studied as a foundation for adaptation towards a changing climate. Furthermore, the analyses of defects reveal a fundamental need for climate differentiated design guidelines.

New and improved methods for geographically dependent design of building envelopes are proposed:

- A method for assessing the relative potential of frost decay or frost damage of porous, mineral building materials exposed to a given climate is developed.

- A national map of the potential for decay in wood structures is developed. Detailed scenarios for climate change for selected locations in Norway are used to provide an indication of the possible future development of decay rates.

- A method for assessing driving rain exposures based on multi-year records of synoptic observations of present weather, wind speed and direction is also presented.

These climate indices can be used as a tool for evaluation of changes in performance requirements or decay rates due to climate change under global warming incorporating data from regional- and local-level climate change scenarios. Historical records of climate data have finally been used to illuminate challenges arising when introducing international standards at the national level, without considering the need for adjustments to reflect varying local climatic conditions.

At present, building standards and design guidelines presuppose use of historic weather data. Historically, location-specific climate data have only to a very limited extent been applied systematically for design purposes, life cycle assessments, and climate differentiation of the suitability of a given technical solution in a given climate. The work is a first step towards methods and approaches allowing for geographically dependent climate considerations to be made in the development of design guidelines for high-performance building envelopes, and also approaches to assess the risks associated with the future performance of building envelopes due to climate change.

The dissertation focuses on methods for assessing impacts of external climatic parameters on a local scale, but with the use of daily and monthly averages of climate data. The reliability of climate indices or climate differentiated design guidelines is strongly dependent on the geographical spreading of the observing station network. The Norwegian network is not optimally distributed to fully embrace local variations, but provides a solid platform for the development of methods for geographically dependent design and guidelines on the appropriateness of different solutions in different climates.

Climate indices (using geographic information systems technology)allowing for quantitative assessment of building envelope performance or decay potential may be an important element in the development of adaptation measures to meet the future risks of climate change in different parts of the world. Finally, the work offers a conceptual point of departure for the development of a vintage model of the robustness of the Norwegian building stock.


Paper VII, IX, XI and XII reprinted with kind permission of Elsevier, sciencedirect.com
APA, Harvard, Vancouver, ISO, and other styles
5

Rosettani, Matteo. "Algorithms and method for power management in HAS." Doctoral thesis, Università Politecnica delle Marche, 2011. http://hdl.handle.net/11566/242008.

Full text
Abstract:
Sono ormai molti anni che si discute riguardo la possibilità di uniformare il sistema domotico, ovvero quello relativo all'automazione della casa e sembra che si stia progredendo verso un periodo in cui potrebbero esserci tutti i fattori necessari per il corretto sviluppo delle tematiche relative all'Home Automation, in particolar modo l'amministrazione e lo studio della logica che governa i dispositivi che popolano le abitazioni. La domotica, ovvero l'insieme delle tecnologie impiegate nell'automazione delle abitazioni, è considerata pronta per il salto di qualità che la possa condurre fuori dalle applicazioni più tradizionali, anche con grandi ripercussioni economiche. Il mercato attuale dell'industria mondiale dell'Home Automation si aggira sui 2,5 miliardi di dollari, ma entro il 2014 dovrebbe raggiungere i 13,4 miliardi (fonte ING Direct). La casa intelligente, o Smart Home, utilizzando la dicitura corretta insieme al concetto di Smat Grid, gurano nell'ultimo rapporto annuale della Consumer Electronics Association tra le cinque tecnologie da tenere d'occhio. C'è però da considerare una differenza tra quello che le tecnologie promettono e ciò che un end-user può oggettivamente pensare di installare in questo momento. Dal primo punto di vista, teoricamente è già tutto pronto per la realizzazione di uno scenario in cui gli impianti di casa sono interconnessi, dialogano tra loro e con gli abitanti, segnalano guasti e in qualche caso anticipano gli stessi desideri del proprietario. D'altro canto però è tuttavia vero che i maggiori produttori di elettrodomestici e dispositivi non hanno trovato un accordo circa lo standard di comunicazione da adottare per far dialogare questi dispositivi, men che meno sono state de nite uniformemente delle politiche di controllo relativamente alla coordinazione degli stessi per soddisfare i bisogni dell'end-user. Questo lavoro di tesi si inserisce nella suddetta tematica, a rontando i prob- lemi appena citati, che caratterizzano e limitano lo sviluppo della Smart Home nel contesto del programma Smart grid, de nito e sviluppato sia in Europa che negli Stati Uniti. Le tematiche aff rontate sono state descritte distinguendole in due macroaree: la prima riguarda lo studio e l'analisi dei protocolli di comunicazione per dotare la casa di un'infrastruttura di rete necessaria a sopperire tutte le richieste relative all'Home Automation. Si è quindi proceduto in una prima fase ad analizzare quelli erano i requisiti richiesti ad un'infrastruttura di questo tipo, quali, ad esempio, il consumo energetico, il costo di installazione, il raggio di copertura e la velocità di trasferimento dati. In seguito è stata fatta un'analisi esauriente di diversi protocolli di comunicazione legati al mondo dell'Home Automation, focalizzandoci in particolar modo a quelli candidati a diventare lo HAN (Home Automation Network), aderendo alle speci che de nite dai vari consorzi Smart Grid. Ognuno di questi protocolli è stato ra rontato con i requisiti individuati in precedenza, creando una sorta di classi cazione in base all'attinenza o meno a queste speci fiche. Al termine di questa analisi le tecnologie candidate a ricoprire il ruolo di HAN sono state 3 e nello specifi co il Bluetooth, lo ZigBee e il protocollo LonWorks. Alla fine lo ZigBee è riuscito a prevalere tra questi tre, o rendo una migliore rispondenza alle speci che Smart Grid (Energy Pro le 2.0) ed essendo già accolto molto bene dal mercato come infrastruttura di rete per l'Home Automation. La seconda fase di questa analisi si è quindi concentrata sulla seconda prob- lematica, relativa alla logica di controllo e coordinamento tra i vari dispositivi che compongono un tipico scenario domestico. In particolar modo, la prima sezione si è concentrata sulla definizione e sulla determinazione dell'impianto teorico necessario alla trattazione dei due metodi sviluppati: si è mostrato quindi l'approccio di Woolridge alla trattazione dei MASs, modi candone alcuni aspetti per rendere più conformi tali concetti alla classe degli HASs. L'analisi si è quindi concentrata nello studio dello Stato dell'Arte esistente, sia per quanto concerne la Teoria dei Sistemi Multi Agente che quella riguardante le problematiche relative all'allocazione delle risorse. Questi due metodi sviluppati hanno quindi lo scopo di risolvere i conflitti che si possono venire ad instaurare sull'utilizzo concorrenziale delle risorse condivise che si trovano all'interno di una tipica installazione domestica, come ad esempio la corrente elettrica e l'acqua calda. L'obiettivo nella risoluzione di tali con itti tende ad ottimizzare l'intero sistema, cercando di trovare un regime di funzionamento dei vari dispositivi che possa soddisfare e esigenze e i desideri dell'end-user. Entrambi i metodi sviluppati, chiamati GT-HAS (Game Theoretic-HAS) e MKP-HAS (Multiperiod Knapsack Problem-HAS) utilizzano dei funzionali la cui massimizzazione permette di ottenere, localmente e, date le proprietà dei sistemi costruiti, anche globalmente, delle performance che soddisfano le preferenze dell'end-user. L'analisi di questa problematica si conclude con la validazione dei due metodi prendendo alcuni scenari di esempio in esame e facendo un confronto delle prestazioni relative ed assolute fornite dai GT-HASs e dai MKP-HASs.La fase conclusiva del lavoro si concentra su alcune considerazioni riguardanti la teoria elaborata e alcune proposte riguardanti gli sviluppi futuri, come il miglioramento dei metodi GT-HAS e MKP-HAS e la possibilità di estendere l'ottimizzazione anche ad una famiglia di risorse. In attesa che il mercato si evolva verso una soluzione convergente e standard.
There were many years that the possibility of uniforming the domotic system has been discussed, or rather the one relative to the automation of the house and it seems that we are proceeding to a period in which all the necessary factors for developing the Home Automation problematic will be available, in particular for those concerning the administration and the study of the logic that manages the house devices. The domotic, that is the set of technologies implemented to automate the house, is considered ready for the quality leap that would lead it out of the more traditional applications, also with big economical repercussions. The present worldwide market of the Home Automation industry has a total turnover of about 2.5 dollar billions, but within the 2014 it will be reach a value of 13.4 billions (source ING Direct). The smart home in addition with the concept of the Smart Grid appear, on the last annual report of the Consumer Electronics Association, as one of the rst ve technology to keep an eye on. However, it is necessary to consider a di erence between what the technologies allow to do and what an end-user could e ectively think to install at the moment. From the rst point of view, theoretically, it is all already done to realize a scenario in which the house installations are interconnected, dialogue with each other and with the users, eventually signal faults and, in some cases, anticipate the wishes of the owner. On the other hand, it is nevertheless true that the major white goods and home devices producers have not jet found an agreement about the communication standard to use for the data exchange among these appliances and, furthermore, the control policies relative to the coordination of the devices that have the objective of satisfying the end-user needs have not jet been de ned. This PhD thesis enters in the aforementioned topic, facing the just cited problems that characterize and limit the development of the Smart Home in the framework of the Smart grid programme, de ned and currently developed in Europe and United States. The approached thematics have been described distinguish them in two macro-areas: the rst one concerns the study and the analysis of the communication protocols to endow the house with a network in- frastructure needed to provide all the requests relative to the Home Automation. Thus, in a rst phase, the requisites for an home network infrastructure have been analyzed, such, for example, the energy consumption, the installation cost, the coverage range and the data transfer rate. In the following, an exhaustive analysis of the various communication protocols for the Home Automation has been done, focusing in particular in those ones candidate to become the HAN (Home Automation Network), complying with the speci cations de ned by the various Smart Grid consortium. Each one of these protocols has been compared with the requisites identi ed in the previous steps, creating a sort of classi cation on the basis of the accordance or less with these speci cations. At the end of this study, the candidate technologies for the role of HAN were three and, more speci cally, they were Bluetooth, ZigBee and the Lonworks protocol. After further tests, ZigBee prevailed among the two opponents, o ering a better correspondence with the Smart Grid requirements (Energy Pro le 2.0) and being already well accepted in the market as network infrastructure for the Home Automation. The second phase of this analysis was focused on the second problematic, relative to the control logic and coordination of the various devices that composes a typical household scenario. In particular, the rst section was concentrated on the de nition and determination of the needed theoretical framework for managing the two developed methods: it was showed the Woolridge approach to handle the MASs, modifying some aspects and concepts to comply them with the HASs class. Then, the analysis was focused on the study of the existent State of the Art, both for what concerns the the Multi Agent theory and that regarding the problematics relative to the resource allocation. These two developed methods have the purpose of resolving conflicts which can occur when the devices are trying to use shared resources in a typical household installation like, for example, the electricity and the hot water. The objective in resolving such conflicts consists in optimizing the whole system, trying to nd a functioning scheme of the various devices that can satisfy the demands and wishes of the end-user. Both the developed methods, called GT-HAS (Game Theoretic-HAS) and MKP-HAS (Multiperiod Knapsack Problem-HAS), use functions whose maximization permits to obtain locally and, given the properties of the built frameworks, also globally, performances that satisfy the preferences of the end-user. The analysis of this kind of problematic ends with the validation of the two methods, taking in exam some exemplifying scenarios and comparing the relative and absolute performances provided by GT-HAS and MKP-HAS.
APA, Harvard, Vancouver, ISO, and other styles
6

Cichowski, Dawid [Verfasser], Peter [Akademischer Betreuer] Woias, and Ingo [Akademischer Betreuer] Krossing. "Rapid fabrication methods and modular packaging of chip-based microreactors for harsh multiphase reactions." Freiburg : Universität, 2017. http://d-nb.info/116814566X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bowden, Michael Russell. "Family Impact and Infant Emotional Outcomes when an Infant Has Serious Liver Disease: A Longitudinal Mixed Methods Study." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14702.

Full text
Abstract:
Background Serious liver disease in infancy causes significant morbidity. Up to 80% of children will eventually require transplantation. This study aims to investigate parent and family responses to the diagnosis of serious liver disease in infancy and to identify family factors that are predictive of the infants’ emotional and behavioural outcomes. Methods The study uses quantitative and qualitative methods. Parents of infants recently diagnosed with serious liver disease completed validated measures of parent stress, family function, impact of the illness on the family, and father engagement, as well as an interview about their experience of the infants’ illness. The measures were repeated after one year, with the addition of the Child Behavior Checklist (CBCL). Results Parents of 42 infants enrolled, and parents of 37 infants completed the study. Illness severity, liver diagnosis other than Biliary Atresia and parent perceptions of greater impact of the infants’ illness on the family predicted poorer infant outcomes. For mothers, the final best-fit model explained 32% of the variation in CBCL (P = .001). Fathers’ best-fit model explained 44% of the variation in CBCL (P < .001). Thematic analysis of the parent interviews revealed six major themes: uncertainty; awareness of the infant’s vulnerability; feelings of isolation; dealing with other aspects of life; the importance of shared experience; and adjustment. The integrated data analysis demonstrated that lack of extended family support, poor family adjustment to the illness, and financial stress are related to greater impact of the illness on the family. Conclusions The study identifies early risk factors for poor emotional and behavioural outcomes for infants with serious liver disease, providing an opportunity for early intervention. Parents who lack support from extended family, who have financial stress, or who report a high impact of the illness on the family, should be referred for psychosocial assessment.
APA, Harvard, Vancouver, ISO, and other styles
8

Ridge, Helen E. "A multi-method study to investigate whether the pharmacist has a role on the neonatal unit." Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Musa, Ibrahim, and Charles Nordström. "“And so each and every teacher has to handle it to the best of their abilities”." Thesis, Malmö universitet, Fakulteten för lärande och samhälle (LS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28767.

Full text
Abstract:
The purpose of this study was to investigate the methods and strategies teachers in Malmö and Lund, Sweden, use to overcome issues faced when working with newly arrived students in teaching English. There was a need to explore this further since there is a lack of previous research in the area, as well as a lack of education on how to teach these students. Our two research questions investigate what specific difficulties teachers report facing when working with newly arrived students in English, and what teaching strategies/methods these teachers utilize to overcome these difficulties. To answer this, we conducted five semi-structured interviews with teachers who have experience in teaching English to newly arrived students. Our results show teachers feel a general feeling of unpreparedness through the lack of official support and measures in coping with these challenges. Moreover, the teachers employ several different types of coping strategies to help the newly arrived students, and they also report on the issues which can arise due to cultural contrasts. The implications of our findings is that there is a lack of a centralized, coherent approach among teachers on how to work with this population, as well as a lack of education in how to do so. Teachers require more training and more resources to better meet the needs of these students.
APA, Harvard, Vancouver, ISO, and other styles
10

Botha, Marinda. "The use of sandplay psychotherapy with an adolescent who has poor self-esteem." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/25510.

Full text
Abstract:
The purpose of this study was to explore and describe the potential use of Sandplay psychotherapy with an adolescent who presented with poor self-esteem. In conducting my research I assessed one adolescent’s selfesteem by means of quantitative and qualitative measures and identified potential aspects that might require intervention, related to self-esteem. After the initial assessment, Sandplay psychotherapy was implemented as intervention, after which the participant’s self-esteem was re-assessed, comparing the results with those obtained during the initial assessment (baseline data). For the purpose of my study, I fulfilled the role of researcher, involving an intern educational psychologist in assessing the participant and conducting the intervention, thereby fulfilling the role of therapist. I followed a triangulation mixed methods intervention research approach, primarily relying on the interpretivist paradigm yet being informed and elaborated upon by a post-positivist component. I studied a single clinical case situated within the context of psychotherapy outcome research. This enabled me to draw conclusions on how suitable and helpful Sandplay psychotherapy might be (or not) for an adolescent who presented with poor self-esteem. In collecting quantitative data, I employed the Self-Esteem Index (Brown&Alexander, 1991) both prior to and after the intervention had been completed. In support, a qualitative post-modern assessment was included in the form of the Rosebush technique (Oaklander, 1988). Other qualitative data collection and documentation measures include observations, semi-structured interviews (with the participant and her parents), photographs of the sand trays and a semi-structured reflection journal (of the participant), as well as reflection journals of the researcher and therapist. Based on the pre- and post-assessments I was able to compare results of the participant’s self-esteem before and after the Sandplay psychotherapy intervention had been completed. Subsequent to thematic qualitative data analysis and my comparison of the quantitative results I obtained, three main themes emerged. Firstly, the self-esteem of the participant seemed to have improved following the intervention, since her limited self-knowledge, feelings of inferiority and her uncertainty in unknown situations seemingly changed into age-appropriate self-knowledge, feelings of self-worth and facing the unknown. Secondly, she displayed changes in the emotional domain of development post-intervention. She seemed more content with her situation, reportedly feeling more safe and secure as opposed to feeling academically pressured, as was the case at the onset of my study, and having a positive future perspective. Thirdly, changes in her social domain of development occurred as she displayed age-appropriate skills, acted more assertively and felt more accepted and ready to establish relationships. Based on the findings of my study, I can conclude that it seems possible to facilitate the improvement of adolescents’ self-esteem by conducting Sandplay psychotherapy. Besides an improvement in terms of overall self-esteem, the participant in my study seemingly displayed improvement in the areas of relationships and social skills, as well as conflict resolution skills.
Dissertation (MEd)--University of Pretoria, 2010.
Educational Psychology
unrestricted
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "HASH METHODS"

1

Gottlieb, Adam. The art and science of cooking with cannabis: The most effective methods of preparing food & drink with marijuana, hashish & hash oil. Berkeley, Calif: Ronin Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fain, Annika M. V. A comparison of water quality monitoring using Hach, LaMotte, and bench top methods. Bellingham, WA: Huxley College of Environmental Studies, Western Washington University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wenn du willst, was du noch nie gehabt hast, dann tu, was du noch nie getan hast: Geschichten und Lebensweisheiten. Freiburg, Br: Herder, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rahman, Mizanur. Impact evaluation of the Mayer Hashi Program of long-acting and permanent methods of contraception in Bangladesh. Chapel Hill: Measure Evaluation, Carolina Population Center, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Voronin, Evgeniy, Aleksandr Chibunichev, and Yuriy Blohinov. Reliability of solving inverse problems of analytical photogrammetry. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2010462.

Full text
Abstract:
The monograph is devoted to computational aspects of photogrammetric reconstruction of narrow-angle bundles of projecting beams that existed during the survey. Methods of improving the conditionality of systems of linear equations, ensuring the convergence of iterative refinement of their roots, increasing the stability of calculations in finite precision machine arithmetic are considered. The main efforts are focused on solving the problem of establishing reliable measurement weights within the framework of the least squares method. The criteria for the reliability of the weights are determined. Algorithms have been developed for matching the initial values of the measurement weights, adjusting the weights during equalization, and identifying insignificant parameters of mathematical measurement models. A new method for evaluating the accuracy of the equalization results has been developed. For specialists engaged in the processing of remote sensing data of the Earth and mathematical processing of the results of heterogeneous measurements using weighted methods of statistical estimation of the parameters of functional dependencies.
APA, Harvard, Vancouver, ISO, and other styles
6

Spirin, Yuriy, Sergey Zotov, Evgeniy Krasnov, and Nadezhda Cvetkova. Polder watercourses: research methods and geoecological assessment. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1903343.

Full text
Abstract:
The monograph describes research methods and geoecological assessment of polder lands. The history of research and practical use of surface waters of the Kaliningrad region is characterized, modern problems of their geoecological state are revealed. The characteristic of polder lands as complex natural and economic systems is given, the necessity of geoecological studies of the catchments of small rivers located on them is substantiated. A methodological approach has been developed to assess the geoecological condition of the basins of small watercourses through the combined analysis of hydrological, hydrochemical and geoecological data. Hydrological calculations of the key characteristics of the river flow of small watercourses of polder lands were carried out, the dependencies between them were revealed. Field studies were carried out, hydrochemical data sets were obtained on the rivers of polder lands for four hydrological seasons of 2020-2021. Retrospective hydrochemical information has been processed. The prevailing pollutants, integral indicators of water quality and the main sources of pollution are calculated. Based on the results obtained, a scheme of spatial distribution of pollution of the river network of polder lands is constructed. The geoecological condition of the basins is assessed on the basis of a complex of natural and anthropogenic data; based on the result obtained, recommendations for its improvement are given. It is of interest to specialists in the field of geoecology, hydrology, hydrochemistry, environmental management and environmental protection.
APA, Harvard, Vancouver, ISO, and other styles
7

Nakov, Svetlin. Fundamentals of Computer Programming with C#: The Bulgarian C# Book. Sofia, Bulgaria: Svetlin Nakov, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kas'yanova, Svetlana, Viktoriya Saliy, Zinaida Sharudina, Oksana Madatova, and Lyudmila Kucegreeva. Methodological aspects of the evaluation of the internal control system of the organization. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1907644.

Full text
Abstract:
The monograph systematizes methodological approaches to assessing the level of organization of the internal control system, its main components, examines the accounting system as the main instrument of internal control, provides various methods of risk assessment, preparation of working documentation of internal control procedures, tests. The integration of analytical procedures as a method of control when conducting internal control procedures in an organization to achieve appropriate results is shown. A multilevel model for evaluating the system of internal control over the activities of commercial organizations and a methodology for conducting internal control procedures in the accounting system has been developed. It is intended for specialists in the field of control, audit, researchers, doctoral students and postgraduates.
APA, Harvard, Vancouver, ISO, and other styles
9

Ksenofontov, Boris, and Aleksandr Lukanin. Flotation combines for wastewater treatment with several working fluids. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1938077.

Full text
Abstract:
In the monograph, for the first time in world practice, the issues of intensification of flotation processes of wastewater treatment and compaction of excess activated sludge due to the use of several working fluids are considered. It is noted that flotation equipment is mainly used for wastewater treatment of pressure type. Although the flotation process has been known for a long time, there are relatively few fundamentally new technical solutions in this area. In this regard, the author describes in detail the method of flotation developed by the author with two and three working fluids, of which one is a working fluid with hardly soluble gas (air), and the others with easily soluble gases, such as carbon dioxide and biogas. At the same time, the interpretation of the new effect is based on a multi-stage flotation model developed by the author. This method was developed, tested and used by the author for the first time in domestic practice at biotechnological enterprises. Methods and flotation installations in the form of water flow combines using two and three working fluids saturated with gases with different solubility in water are described. It is offered for a wide range of readers, including researchers, bachelors, masters, postgraduates, as well as for anyone interested in water purification issues.
APA, Harvard, Vancouver, ISO, and other styles
10

GREGORY, Lisa H. Essential Diy Cannabis Extracts : Beyond Cannabis Extracts: The Handbook to Diy Concentrates, Hash and Original Methods for Marijuana Extracts. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "HASH METHODS"

1

van der Vegt, Steven, and Alfons Laarman. "A Parallel Compact Hash Table." In Mathematical and Engineering Methods in Computer Science, 191–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25929-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pepper, Peter, Ralph Betschko, Sabine Dick, and Klaus Didrich. "Realizing sets by hash tables." In KORSO: Methods, Languages, and Tools for the Construction of Correct Software, 58–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mouha, Nicky. "Exploring Formal Methods for Cryptographic Hash Function Implementations." In Information Security and Privacy, 177–95. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35486-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hai, Nguyen Minh, Quan Thanh Tho, and Le Duc Anh. "Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction." In Formal Methods and Software Engineering, 159–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, and Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization." In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.

Full text
Abstract:
AbstractIn recent years, with the development of mobile terminals, geographic location has attracted the attention of many researchers because of its convenience in collection and its ability to reflect user profile. To protect user privacy, researchers have adopted local differential privacy in data collection process. However, most existing methods assume that location has already been discretized, which we found, if not done carefully, may introduces huge noise, lowering collected result utility. Thus in this paper, we design a differentially private location division module that could automatically discretize locations according to access density of each region. However, as the size of discretized regions may be large, if directly applying existing local differential privacy based attribute method, the overall utility of collected results may be completely destroyed. Thus, we further improve the optimized binary local hash method, based on personalized differential privacy, to collect user visit frequency of each discretized region. This solution improve the accuracy of the collected results while satisfying the privacy of the user’s geographic location. Through experiments on synthetic and real data sets, this paper proves that the proposed method achieves higher accuracy than the best known method under the same privacy budget.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Na, and TianXiang Yue. "Modern HASM Method." In High Accuracy Surface Modeling Method: The Robustness, 41–70. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4027-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wei, Xing, Huiqi Hu, Xuan Zhou, and Aoying Zhou. "A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins." In Web Information Systems Engineering – WISE 2020, 376–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62008-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Fei, Hongzhi Wang, Liang Hao, Jianzhong Li, and Hong Gao. "pq-Hash: An Efficient Method for Approximate XML Joins." In Web-Age Information Management, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16720-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Jiayi, Lulu Bei, Dan Li, Ping Cui, and Kai Huang. "A Video Parallel Retrieval Method Based on Deep Hash." In Simulation Tools and Techniques, 135–41. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97124-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tsekouras, Vasileios, Sofia Mavrikou, and Spyridon Kintzios. "Trends in Biosensors and Current Detection Methods for Stress Monitoring of Plants Growing in Adverse Environmental Conditions." In Harsh Environment and Plant Resilience, 409–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65912-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "HASH METHODS"

1

van der Berg, Freark I., and Jaco van de Pol. "Concurrent Chaining Hash Maps for Software Model Checking." In 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 2019. http://dx.doi.org/10.23919/fmcad.2019.8894279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karabat, Cagatay, and Hakan Erdogan. "Biometric hash: A study on statistical quantization methods." In 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moreno, Pedro, Miguel Areias, and Ricardo Rocha. "Memory Reclamation Methods for Lock-Free Hash Tries." In 2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). IEEE, 2019. http://dx.doi.org/10.1109/sbac-pad.2019.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luzhetsky, Volodymyr, and Yurii Baryshev. "Methods of generic attacks infeasibility increasing for hash functions." In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6663007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rayatidamavandi, Maede, Yu Zhuang, and Mahshid Rahnamay-Naeini. "A Comparison of Hash-Based Methods for Trajectory Clustering." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sasao, Tsutomu, and Munehiro Matsuura. "An Implementation of an Address Generator Using Hash Memories." In 2007 10th Euromicro Conference on Digital System Design: Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Xiao, Daqing Wu, Zeyu Ma, Chong Chen, Minghua Deng, Jinwen Ma, Zhongming Jin, Jianqiang Huang, and Xian-Sheng Hua. "CIMON: Towards High-quality Hash Codes." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/125.

Full text
Abstract:
Recently, hashing is widely used in approximate nearest neighbor search for its storage and computational efficiency. Most of the unsupervised hashing methods learn to map images into semantic similarity-preserving hash codes by constructing local semantic similarity structure from the pre-trained model as the guiding information, i.e., treating each point pair similar if their distance is small in feature space. However, due to the inefficient representation ability of the pre-trained model, many false positives and negatives in local semantic similarity will be introduced and lead to error propagation during the hash code learning. Moreover, few of the methods consider the robustness of models, which will cause instability of hash codes to disturbance. In this paper, we propose a new method named Comprehensive sImilarity Mining and cOnsistency learNing (CIMON). First, we use global refinement and similarity statistical distribution to obtain reliable and smooth guidance. Second, both semantic and contrastive consistency learning are introduced to derive both disturb-invariant and discriminative hash codes. Extensive experiments on several benchmark datasets show that the proposed method outperforms a wide range of state-of-the-art methods in both retrieval performance and robustness.
APA, Harvard, Vancouver, ISO, and other styles
8

Nouri, Mahdi, Ali Khezeli, Alireza Ramezani, and Azita Ebrahimi. "A dynamic chaotic hash function based upon circle chord methods." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kitsos, Paris, Nicolas Sklavos, and Athanassios N. Skodras. "Low Power FPGA Implementations of 256-bit Luffa Hash Function." In 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS." In International Conference on Research in Business management & Information Technology. ELK ASIA PACIFIC JOURNAL, 2015. http://dx.doi.org/10.16962/elkapj/si.it.icrbit-2015.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "HASH METHODS"

1

Yatsenko, Halyna, and Andriy Yatsenko. Використання креативних методів навчання під час викладання дисциплін «Історія української журналістики» і «Креативний текст». Ivan Franko National University of Lviv, March 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11736.

Full text
Abstract:
It is emphasized on the use of creative methods in teaching journalism disciplines at the Faculty of Journalism of the Ivan Franko National University of Lviv. The main creative teaching methods are described: the brainstorming method, the «circle of ideas» method, the alternative history method, the morphological analysis method, the hyperbolization method, the «Skamper» method, the Synectics methods. It has been demonstrated that creative teaching methods improve the learning effectiveness and new competencies obtaining. Key words: creative teaching methods; online platform; project work; training courses; personality; learning effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
2

Kiefner, John, and Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2002. http://dx.doi.org/10.55274/r0011828.

Full text
Abstract:
Presented herein is a comparison of three pipeline integrity assessment methods: hydrostatic testing, in-line inspection, and direct assessment. Pipeline operators use one or more of these methods to investigate the soundness of their pipelines in order to protect people, property, and the environment from the consequences of pipeline leaks or ruptures. Three separate methods exist because no single method has been found to be completely satisfactory by itself in every situation. By comparing the attributes of each method, pipeline operators will be better able to choose a method or combination of methods that is best suited for a particular situation.
APA, Harvard, Vancouver, ISO, and other styles
3

Masset, Edoardo, and Howard White. To boldly go where no evaluation has gone before: The CEDIL Evaluation Agenda. Centre for Excellence and Development Impact and Learning (CEDIL), July 2019. http://dx.doi.org/10.51744/ceap.

Full text
Abstract:
This paper introduces the rationale behind the establishment of the Centre of Excellence in Development, Impact and Learning (CEDIL) and the challenges it will address. CEDIL was established with funding from the UK Government through the Department for International Development (DFID), with the aim of developing and supporting new methods and approaches in the evaluation of international development interventions in neglected geographic, and thematic areas. CEDIL has concluded its inception phase, which explored new evaluation methods and approaches with a series of papers, workshops, and consultations. This paper sets out CEDIL’s research agenda for the next three years. CEDIL will promote studies in three key areas: 1) unpacking complex interventions with mixed methods approaches, and exploration of mechanisms, 2) generalising evidence through the formulation of mid-level theories of neglected interventions, and 3) promoting evidence use through stakeholder engagement and demonstrating what works within such communication.
APA, Harvard, Vancouver, ISO, and other styles
4

Mahmoud, Hussam, Guillermo Riveros, Lauren Hudak, and Emad Hassan. Experimental fatigue evaluation of underwater steel panels retrofitted with fiber polymers. Engineer Research and Development Center (U.S.), March 2023. http://dx.doi.org/10.21079/11681/46647.

Full text
Abstract:
Many steel structures are susceptible to fatigue loading and damage that potentially threaten their integrity. Steel hydraulic structures (SHS) experience fatigue loading during operation and exposure to harsh environmental conditions that can further reduce fatigue life through stress corrosion cracking and corrosion fatigue, for example. Dewatering to complete inspections or repairs to SHS is time consuming and leads to economic losses, and current repair methods, such as rewelding, often cause new cracks to form after relatively few cycles, requiring repeated inspection and repair. The use of bonded carbon fiber–reinforced polymer (CFRP) to repair fatigue cracks in metallic structures has been successful in other industries; recent work suggests that this method offers a more reliable repair method for SHS. Studies regarding CFRP retrofits of SHS indicate that early bond failure often controls the degree of fatigue life extension provided by the repair. This study aims to extend previous studies and increase the fatigue life of repaired steel components by employing methods to improve CFRP bonding. Additionally, using basalt reinforced polymer (BFRP) instead of CFRP is proposed. BFRP is attractive for SHS because it does not react galvanically and has excellent resistance to chemically active environments.
APA, Harvard, Vancouver, ISO, and other styles
5

Mills, Chris. PR-363-18604-Z01 Mass-Based Proving Methods for Mass Flow Meters. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), April 2019. http://dx.doi.org/10.55274/r0011579.

Full text
Abstract:
Due to the increased utilization of mass-based flowmeters for flow measurement of hydrocarbons, there is a requirement for a direct method for proving/calibrating a mass flowmeter directly using a measured mass. The project objective was to identify, review and rank suitable methods for proving/calibrating a mass-based flowmeter directly using a measured mass. The preferred method has been recommended and potential changes to industry standards have been highlighted. This report has a related webinar.
APA, Harvard, Vancouver, ISO, and other styles
6

Lubkovych, Igor. METHODS OF JOURNALISTIC COMMUNICATION. Ivan Franko National University of Lviv, March 2021. http://dx.doi.org/10.30970/vjo.2021.50.11096.

Full text
Abstract:
Journalistic communication is professional, its purpose is to obtain information and share it withthe audience. A journalist communicates when he intends to receive information directly from the interlocutor, from documents that the interlocutor has, or by observing the behavior of the interlocutor during the conversation. The most common method is communication in order to obtain verbal information. In the course of communication, a journalist succeeds when he adheres to politeness, clarity, brevity. It is important that the conditions of communication must be prepared or created: a place of communication, participants of communication, demonstration of listening skills, feedback. You should always try to get documentary evidence of what you have heard. An active reaction to what is heard by the journalist should be used to find out how much the interlocutor understands what is being said. At the beginning of the conversation, when the interlocutor expresses his attitude to the event or problem in question, it should not be interrupted. A journalist, like most people, often makes two mistakes when communicating: perceives as truth what is presented and attributes characteristics. Attribution of the characteristic as a psychological error is known since the beginning of the last century. And the perception of everything as the truth has long been inherent in our society.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Anjali. Ultimate Guide to Automated Cell Counter: Plus Purchasing Tips. ConductScience, June 2022. http://dx.doi.org/10.55157/cs20220614.

Full text
Abstract:
An automated cell counter is a machine that uses either image analysis or electrical impedance principles to count cells automatically. The electrical impedance principle involves measuring changes in electrical resistance as cells pass through an aperture, while the light-scattering principle observes how cells scatter light when exposed to it. There are four main types of automated cell counting methods: Coulter Counter, Image Analysis Method, Flow Cytometry, and Stereological Cell Counting. Each method has its benefits and limitations, offering faster and more objective cell counting compared to manual methods, but also facing challenges like cost and potential counting inaccuracies. To use an automated cell counter, samples are prepared by pipetting cell suspension onto counting slide chambers, and the machine then provides a total cell count per ml.
APA, Harvard, Vancouver, ISO, and other styles
8

Kiefner, Maxey, and Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 1989. http://dx.doi.org/10.55274/r0010294.

Full text
Abstract:
Prior research leading to the development of predictive electromagnetic coupling computer codes has shown that the coating conductance is the principal factor in determining the response of a pipeline to magnetic induction transmission line. Under power line fault conditions, a high voltage may stress the coating causing a significant change in its conductance, and hence, the coupling response. Based upon laboratory experimentation and analysis, a model has been developed which allows prediction of the modified coating characteristics when subjected to high voltages during fault situations. The program objective was the investigation of a method to determine the high voltage behavior of an existing coating from low voltage in-situ field measurements. Such a method appeared conceptually feasible for non-porous coatings whose conductance is primarily a result of current leakage through existing holidays. However, limited testing has shown that difficulties in determining the steel-electrolyte capacitance limit the application of the method. Methods for field measurement of the pipeline coating conductance were studied for both DC and AC signal excitation. AC techniques offer the advantage that cathodic protection current interruption is not required, thus eliminating depolarization effects. However, ac field measurement techniques need additional refinement before these methods can be generally applied.
APA, Harvard, Vancouver, ISO, and other styles
9

Corscadden, Louise, and Anjali Singh. Grip Strength Test In Rodents. ConductScience, January 2023. http://dx.doi.org/10.55157/cs2023109.

Full text
Abstract:
The grip strength test is one of the most commonly applied tests in animal laboratories to measure neuromuscular functions or disorders. It was first developed in the 1970s. Today a wide range of techniques are available to study muscle strength in rodents. These methods are categorized into two categories:[2] Invasive method: In situ and in vitro measurements of muscle force are invasive methods. Non-invasive method: This method only includes in vivo measurement tests to analyze muscle force such as treadmill tests, wire hang tests, swimming endurance, vertical pole test, and grip strength tests. The most convenient technique of all tests is the grip strength test. It’s most convenient and causes less stress to animals. The grip test has been widely used in order to investigate the phenotypes of transgenic mice with neuromuscular disease and evaluate potential compounds involved in the motor functioning of organisms. The tests have been serving the purpose for 30 years either alone or in combination with other tests.
APA, Harvard, Vancouver, ISO, and other styles
10

González-Montaña, Luis Antonio. Semantic-based methods for morphological descriptions: An applied example for Neotropical species of genus Lepidocyrtus Bourlet, 1839 (Collembola: Entomobryidae). Verlag der Österreichischen Akademie der Wissenschaften, November 2021. http://dx.doi.org/10.1553/biosystecol.1.e71620.

Full text
Abstract:
The production of semantic annotations has gained renewed attention due to the development of anatomical ontologies and the documentation of morphological data. Two methods are proposed in this production, differing in their methodological and philosophical approaches: class-based method and instance-based method. The first, the semantic annotations are established as class expressions, while in the second, the annotations incorporate individuals. An empirical evaluation of the above methods was applied in the morphological description of Neotropical species of the genus Lepidocyrtus (Collembola: Entomobryidae: Lepidocyrtinae). The semantic annotations are expressed as RDF triple, which is a language most flexible than the Entity-Quality syntax used commonly in the description of phenotypes. The morphological descriptions were built in Protégé 5.4.0 and stored in an RDF store created with Fuseki Jena. The semantic annotations based on RDF triple increase the interoperability and integration of data from diverse sources, e.g., museum data. However, computational challenges are present, which are related with the development of semi-automatic methods for the generation of RDF triple, interchanging between texts and RDF triple, and the access by non-expert users.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography