Results 91 to 100 of about 25,084,029 (287)

Cross Domain Early Crop Mapping with Label Spaces Discrepancies using MultiCropGAN [PDF]

open access: yesISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Mapping target crops before the harvest season for regions lacking crop-specific ground truth is critical for global food security. Utilizing multispectral remote sensing and domain adaptation methods, prior studies strive to produce precise crop maps in
Y. Wang, H. Huang, R. State
doaj   +1 more source

INFO2009 Group 6 - Data Security & the Data Protection Act [PDF]

open access: yes
Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the ...
Lamazani, Fred-Osei   +3 more
core  

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing
In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold.
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)

open access: yesIEEE Transactions on Quantum Engineering
In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model.
Qing Zhou   +3 more
doaj   +1 more source

Healthcare Data Security Technology: HIPAA Compliance

open access: yesWireless Communications and Mobile Computing, 2019
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general.
Scholas Mbonihankuye   +2 more
semanticscholar   +1 more source

The Network’s Data Security Risk Analysis [PDF]

open access: yes
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core  

Security-oriented data grids for microarray expression profiles [PDF]

open access: yes, 2007
Microarray experiments are one of the key ways in which gene activity can be identified and measured thereby shedding light and understanding for example on biological processes. The BBSRC funded Grid enabled Microarray Expression Profile Search (GEMEPS)
Bayliss, C., Jiang, J., Sinnott, R.O.
core   +1 more source

Home - About - Disclaimer - Privacy