Results 101 to 110 of about 25,084,029 (287)

Report on the IBM data security study [PDF]

open access: bronze, 1974
Lee Danner   +3 more
openalex   +1 more source

A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))

open access: yesCAAI Transactions on Intelligence Technology
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

Dynamic Analysis of a Fractional Breast Cancer Model with Incommensurate Orders and Optimal Control

open access: yesFractal and Fractional
This paper constructs a fundamental mathematical model to depict the therapeutic effects of two drugs on breast cancer patients. The model is described by fractional order differential equations with two control variables.
Yanling Zhao, Ruiqing Shi
doaj   +1 more source

Author Correction: Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption

open access: yesNature Communications, 2021
David Froelicher   +8 more
doaj   +1 more source

Juvenile sanctions for young adult offenders in the Netherlands: an opportunity for rehabilitation?

open access: yesChild and Adolescent Psychiatry and Mental Health
Background To improve rehabilitation and reduce recidivism, adolescent criminal law provides tailor-made sanctioning in which the emphasis is on the offender’s development.
Lise J. C. Prop   +4 more
doaj   +1 more source

Securing Data Encryption

open access: yes, 2019
This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.
openaire   +3 more sources

Multi-sensor near-realtime burnt area monitoring using a superpixel-based graph convolutional network approach

open access: yesGIScience & Remote Sensing
Recent disastrous wildfire seasons highlight the urgent need for timely and accurate wildfire data to support relief efforts, to monitor the environmental impacts and to inform the public.
Michael Nolde   +3 more
doaj   +1 more source

πFL: Private, atomic, incentive mechanism for federated learning based on blockchain

open access: yesBlockchain: Research and Applications
Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. A plethora of incentive mechanism studies have been conducted with the objective of promoting the provision of ...
Kejia Chen   +4 more
doaj  

Building and road detection from remote sensing images based on weights adaptive multi-teacher collaborative distillation using a fused knowledge

open access: yesInternational Journal of Applied Earth Observations and Geoinformation, 2023
Knowledge distillation is one effective approach to compress deep learning models. However, the current distillation methods are relatively monotonous. There are still rare studies about the combination of distillation strategies using multiple types of ...
Ziyi Chen   +5 more
doaj  

Home - About - Disclaimer - Privacy