Results 21 to 30 of about 3,643,121 (304)
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong +3 more
doaj +1 more source
In mental health research, it has proven difficult to find measures of brain function that provide reliable indicators of mental health and well-being, including susceptibility to mental health disorders.
Nikhil Goyal +4 more
doaj +1 more source
Prevalence and Patterns of Microarray Data Sharing [PDF]
Sharing research data is a cornerstone of science. Although many tools and policies exist to encourage data sharing, the prevalence with which datasets are shared is not well understood. We report our preliminary results on patterns of sharing microarray
Heather A. Piwowar, Wendy W. Chapman
core +2 more sources
SCMDOT: Spatial Clustering with Multiple Density-Ordered Trees
With the rapid explosion of information based on location, spatial clustering plays an increasingly significant role in this day and age as an important technique in geographical data analysis.
Xiaozhu Wu, Hong Jiang, Chongcheng Chen
doaj +1 more source
Sharing by Design: Data and Decentralized Commons [PDF]
Ambitious international data-sharing initiatives have existed for years in fields such as genomics, earth science, and astronomy. But to realize the promise of large-scale sharing of scientific data, intellectual property (IP), data privacy, national ...
Contreras, Jorge L., Reichman, Jerome H
core +2 more sources
Low-Light Image Enhancement Based on Maximal Diffusion Values
A vast amount of pictures are taken every day by using cameras mounted on various mobile devices. Even though the clarity of such acquired images has been significantly improved due to the advance of the image sensor technology, the visual quality is ...
Wonjun Kim +3 more
doaj +1 more source
STUDY ON BUILDING EXTRACTION FROM HIGH-RESOLUTION IMAGES USING MBI [PDF]
Building extraction from high resolution remote sensing images is a hot research topic in the field of photogrammetry and remote sensing. However, the diversity and complexity of buildings make building extraction methods still face challenges in terms ...
Z. Ding +3 more
doaj +1 more source
Wellcome Trust Policy on Data Management and Sharing [PDF]
The Wellcome Trust's policy statement on data management and sharing, which was originally published in January 2007 and revised in August ...
David Carr
core +2 more sources
A Locating Method for Multi-Purposes HTs Based on the Boundary Network
Recently, there are various methods for detecting the hardware trojans (HTs) in the integrated circuits (ICs). The circuit's logic representations of different types, structures, and functional characteristics should be different.
Chen Dong +5 more
doaj +1 more source
The promotion of data sharing in pharmacoepidemiology [PDF]
This article addresses the role of pharmacoepidemiology in patient safety and the crucial role of data sharing in ensuring that such activities occur. Against the backdrop of proposed reforms of European data protection legislation, it considers whether ...
Sethi, Nayha
core +1 more source

