Results 1 to 10 of about 403,148 (165)

Signing data citations enables data verification and citation persistence [PDF]

open access: yesScientific Data, 2023
Commonly used data citation practices rely on unverifiable retrieval methods which are susceptible to content drift, which occurs when the data associated with an identifier have been allowed to change.
Michael J. Elliott   +2 more
doaj   +4 more sources

Data verification of nationwide clinical quality registries [PDF]

open access: yesBJS Open, 2019
Background Clinical auditing is an emerging instrument for quality assessment and improvement. Moreover, clinical registries facilitate medical research as they provide ‘real world’ data. It is important that entered data are robust and reliable. The aim
L. R. van der Werf   +5 more
doaj   +2 more sources

Crowdsourced Reconstruction of Cellular Networks to Serve Outdoor Positioning: Modeling, Validation and Analysis

open access: yesSensors, 2022
Positioning via outdoor fingerprinting, which exploits the radio signals emitted by cellular towers, is fundamental in many applications. In most cases, the localization performance is affected by the availability of information about the emitters, such ...
Andrea Brunello   +5 more
doaj   +1 more source

Object Detection Model, Image Data and Results from the “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and Around State Game Lands in Pennsylvania” Paper

open access: yesJournal of Open Archaeology Data, 2021
These data were used to build an object detection model to locate Relict Charcoal Hearths (RCH) as described in the paper “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and around ...
Jeff Blackadar   +2 more
doaj   +1 more source

Geospatial and Image Data from the “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and Around State Game Lands in Pennsylvania” Paper

open access: yesJournal of Open Archaeology Data, 2021
These data were used to build an object detection model to locate Relict Charcoal Hearths (RCH) as described in the paper “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and around ...
Weston Conner   +2 more
doaj   +1 more source

Virtual Sensing and Sensors Selection for Efficient Temperature Monitoring in Indoor Environments

open access: yesSensors, 2021
Real-time estimation of temperatures in indoor environments is critical for several reasons, including the upkeep of comfort levels, the fulfillment of legal requirements, and energy efficiency. Unfortunately, setting an adequate number of sensors at the
Andrea Brunello   +4 more
doaj   +1 more source

Smart Gardening: A Solution to Your Gardening Issues

open access: yesEAI Endorsed Transactions on Internet of Things, 2022
The technology which could make our lives prosper within the four walls could also help to create our own corner of nature nourish. In this paper, we propose a smart gardening system that utilizes the concept of the Internet of Things (IoT) [1].
Niloy Chakraborty   +2 more
doaj   +1 more source

Data Verification in the Agent, Combining Blockchain and Quantum Keys by Means of Multiple-Valued Logic

open access: yesApplied System Innovation, 2023
Network control of autonomous robotic devices involves a vast number of secured data coding, verification, and identification procedures to provide reliable work of distant agents. Blockchain scheme provides here the model of the extended linked list for
Alexey Yu. Bykovsky, Nikolay A. Vasiliev
doaj   +1 more source

Cloud Storage Data Verification Using Signcryption Scheme

open access: yesApplied Sciences, 2022
Cloud computing brings convenience to the users by providing computational resources and services. However, it comes with security challenges, such as unreliable cloud service providers that could threaten users’ data integrity. Therefore, we need a data
Elizabeth Nathania Witanto, Sang-Gon Lee
doaj   +1 more source

Distributed Data Integrity Verification Scheme in Multi-Cloud Environment

open access: yesSensors, 2023
Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic data possession. Consequently, the sampling rate of data integrity verification is low to prevent expensive costs to the auditor.
Elizabeth Nathania Witanto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy