Results 11 to 20 of about 63,648 (277)

GenomeFingerprinter: the genome fingerprint and the universal genome fingerprint analysis for systematic comparative genomics. [PDF]

open access: yesPLoS ONE, 2013
BackgroundNo attention has been paid on comparing a set of genome sequences crossing genetic components and biological categories with far divergence over large size range.
Yuncan Ai   +3 more
doaj   +7 more sources

Enhancing patient admission efficiency through a hybrid cloud framework for medical record sharing [PDF]

open access: yesScientific Reports
The fragmentation of patient data across multiple healthcare institutions presents a significant challenge to realizing timely and effective treatment.
Mona Abughazalah   +3 more
doaj   +2 more sources

Optoelectronic polymer memristors with dynamic control for power-efficient in-sensor edge computing [PDF]

open access: yesLight: Science & Applications
As the demand for edge platforms in artificial intelligence increases, including mobile devices and security applications, the surge in data influx into edge devices often triggers interference and suboptimal decision-making. There is a pressing need for
Jia Zhou   +13 more
doaj   +2 more sources

Smart phosphor with neuromorphic behaviors enabling full-photoluminescent Write and Read for all-optical physical reservoir computing [PDF]

open access: yesNature Communications
The unprecedented growth in information across diverse media drives an urgent need for multifunctional materials and devices beyond conventional electrical paradigms.
Yifei Zhao   +11 more
doaj   +2 more sources

Fast Fourier transform for fingerprint enhancement and features extraction with adaptive block size using orientation fields [PDF]

open access: yesITM Web of Conferences, 2022
Extracting minutiae from a digital fingerprint is a crucial step in a fingerprint-based recognition systems. This work deals with poor-quality fingerprint images containing broken ridges.
Amina Ait Aoudia   +2 more
doaj   +1 more source

Verifiable Computing Using Computation Fingerprints Within FHE [PDF]

open access: yes2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), 2021
We suggest using Fully Homomorphic Encryption (FHE) to be used, not only to keep the privacy of information but also, to verify computations with no additional significant overhead, using only part of the variables length for verification. This method supports the addition of encrypted values as well as multiplication of encrypted values by the ...
Dolev, Shlomi, Kalma, Arseni
openaire   +2 more sources

COLLABORATIVE Wi-Fi FINGERPRINTING INDOOR POSITIONING USING NEAR RELATION [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2020
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment.
Y. Wang   +4 more
doaj   +1 more source

Indoor Location Algorithm Based on CSI Phase Difference Correction [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problems of phase error offset,high fingerprint noise and low accuracy of sample classification in most of the existing indoor passive fingerprint location methods based on Channel State Information(CSI) in complex scenes,an indoor ...
DANG Xiaochao,REN Jiaju,HAO Zhanjun
doaj   +1 more source

In-sensor reservoir computing system for latent fingerprint recognition with deep ultraviolet photo-synapses and memristor array

open access: yesNature Communications, 2022
The separation of sensor, memory, and processor in a recognition system deteriorates the latency of decision-making and increases the overall computing power. Here, Zhang et al.
Zhongfang Zhang   +9 more
doaj   +1 more source

Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data

open access: yesSensors, 2022
Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD).
Alexander Kirfel   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy