Results 61 to 70 of about 20,383 (214)

Frequent Itemset Generation using Double Hashing Technique

open access: yesProcedia Engineering, 2012
AbstractIn data mining, frequent itemsets plays an important role which is used to identify the correlations among the fields of database.In this paper, we propose a new association rule mining algorithm called Double Hashing Based Frequent Itemsets, (DHBFI) in which hashing technology is used to store the database in vertical data format.
Jayalakshmi, N.   +3 more
openaire   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Toward a Secure Future: An Integrated Framework for PII Detection Using NLP and Visual Analysis

open access: yesIEEE Access
Safeguarding Personally Identifiable Information (PII) is critical to prevent data breaches and identity theft in the era of digital services. This paper presents a hybrid PII detection and secure verification system that integrates rule-based regular ...
S. Sheela   +3 more
doaj   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Retirement Savings Incentives for Low‐ and Middle‐Income Individuals: Does Government Funded Matching Change Behaviour?*

open access: yesEconomic Record, EarlyView.
We evaluate a government‐funded matching policy for retirement savings contributions targeted at low‐ and middle‐income individuals. Using a difference‐in‐difference approach, we exploit administrative changes to the Australian Government's retirement contribution matching (co‐contribution) policy to identify the impact of the programme on savings ...
Kristen Sobeck, Robert Breunig
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Single Cell Analysis Reveals Dynamic Changes of Distinct Cell Populations in Human Nickel Allergy

open access: yesAllergy, EarlyView.
We investigated cell types mediating the early and late inflammatory responses in human Ni2+‐allergy by scRNA‐Seq. Early responsiveness was mainly mediated by TLR4+TAGLN− endothelial cells indirectly activating TLR4−KRT16+ keratinocytes, and CCR7+DCN+ DCs. Late responsiveness was crucially driven by infiltration of KLF2+ central memory T cells and TLR4+
Marc Schmidt   +7 more
wiley   +1 more source

Cryptocurrency Bubbles and Costly Mining

open access: yesInternational Economic Review, EarlyView.
ABSTRACT This paper develops a model of a cryptocurrency by incorporating mining into the otherwise standard search‐theoretic monetary framework. As usual, multiple equilibria exist. To obtain a sharp prediction on whether a cryptocurrency' s value will last in the future, I propose a notion of equilibrium refinement based on the feature that mining ...
Kohei Iwasaki
wiley   +1 more source

Boosting Multi-Core Reachability Performance with Shared Hash Tables [PDF]

open access: yes, 2010
This paper focuses on data structures for multi-core reachability, which is a key component in model checking algorithms and other verification methods. A cornerstone of an efficient solution is the storage of visited states.
Laarman, Alfons   +2 more
core   +5 more sources

Scoping Review of Sexual and Gender Minority Health Research in Ireland

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim To map existing sexual and gender minority (SGM) health research in Ireland, identify gaps in literature and outline priorities for future research and healthcare. SGM is an umbrella term that includes people who identify as lesbian, gay, bisexual, transgender, queer or intersex and is sometimes abbreviated as LGBTQI+.
John P. Gilmore   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy