Results 91 to 100 of about 25,084,029 (287)
Mortality rates of elderly Asian American populations based on medicare and social security data [PDF]
Diane S. Lauderdale, Bert Kestenbaum
openalex +2 more sources
Cross Domain Early Crop Mapping with Label Spaces Discrepancies using MultiCropGAN [PDF]
Mapping target crops before the harvest season for regions lacking crop-specific ground truth is critical for global food security. Utilizing multispectral remote sensing and domain adaptation methods, prior studies strive to produce precise crop maps in
Y. Wang, H. Huang, R. State
doaj +1 more source
INFO2009 Group 6 - Data Security & the Data Protection Act [PDF]
Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the ...
Lamazani, Fred-Osei+3 more
core
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold.
Massoud Hadian Dehkordi+2 more
doaj +1 more source
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model.
Qing Zhou+3 more
doaj +1 more source
An overview of privacy and security requirements for data bases [PDF]
J. Richard Dowell
openalex +1 more source
Healthcare Data Security Technology: HIPAA Compliance
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general.
Scholas Mbonihankuye+2 more
semanticscholar +1 more source
The Network’s Data Security Risk Analysis [PDF]
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core
Security-oriented data grids for microarray expression profiles [PDF]
Microarray experiments are one of the key ways in which gene activity can be identified and measured thereby shedding light and understanding for example on biological processes. The BBSRC funded Grid enabled Microarray Expression Profile Search (GEMEPS)
Bayliss, C., Jiang, J., Sinnott, R.O.
core +1 more source