Results 101 to 110 of about 3,073,944 (343)
Cross Domain Early Crop Mapping with Label Spaces Discrepancies using MultiCropGAN [PDF]
Mapping target crops before the harvest season for regions lacking crop-specific ground truth is critical for global food security. Utilizing multispectral remote sensing and domain adaptation methods, prior studies strive to produce precise crop maps in
Y. Wang, H. Huang, R. State
doaj +1 more source
An overview of privacy and security requirements for data bases [PDF]
J. Richard Dowell
openalex +1 more source
Data security for third generation telecommunication systems [PDF]
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core
Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core +2 more sources
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge +5 more
wiley +1 more source
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model.
Qing Zhou +3 more
doaj +1 more source
In‐mold electronics (IME) undergo complex thermoforming and over‐molding processes that strain device integrity. This study demonstrates how adapting the amount and placement of structural adhesive to local deformation levels preserves electrical functionality.
Francisco Ituriel Arias‐García +3 more
wiley +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht +5 more
wiley +1 more source
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi +2 more
doaj +1 more source

