Results 81 to 90 of about 55,204 (231)

Spatiotemporal mapping the usable space of free‐roaming equids across the western United States

open access: yesWildlife Society Bulletin, EarlyView.
Identification of the inter‐decadal (2010‐2011) enhancement‐degradation gradients in the usable space for wild equid Herd Management Areas in the Great Basin, USA. Abstract Management of feral equids in the American West is hindered by the lack of a formal habitat map and monitoring system.
Alexander Hernandez   +3 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Forecasting the cost of processing multi-join queries via hashing for main-memory databases (Extended version)

open access: yes, 2015
Database management systems (DBMSs) carefully optimize complex multi-join queries to avoid expensive disk I/O. As servers today feature tens or hundreds of gigabytes of RAM, a significant fraction of many analytic databases becomes memory-resident.
Ailamaki A.   +16 more
core   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Generic Network Location Service

open access: yesSouth African Computer Journal, 2010
This work presents the Generic Network Location Service based on the Chord implementation utilizing data structures called distributed hash tables (DHT) or structured overlay networks, which are used to build scalable self-managing distributed systems ...
Laban Mwansa, Jan Janeček
doaj  

Cell Grid Architecture for Maritime Route Prediction on AIS Data Streams

open access: yes, 2018
The 2018 Grand Challenge targets the problem of accurate predictions on data streams produced by automatic identification system (AIS) equipment, describing naval traffic.
Amariei, Ciprian   +3 more
core   +1 more source

A Distributed Learned Hash Table

open access: yes2025 IEEE 33rd International Conference on Network Protocols (ICNP)
Distributed Hash Tables (DHTs) are pivotal in numerous high-impact key-value applications built on distributed networked systems, offering a decentralized architecture that avoids single points of failure and improves data availability. Despite their widespread utility, DHTs face substantial challenges in handling range queries, which are crucial for ...
Wang, Shengze   +4 more
openaire   +2 more sources

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy