GenomeFingerprinter: the genome fingerprint and the universal genome fingerprint analysis for systematic comparative genomics. [PDF]
BackgroundNo attention has been paid on comparing a set of genome sequences crossing genetic components and biological categories with far divergence over large size range.
Yuncan Ai +3 more
doaj +7 more sources
Enhancing patient admission efficiency through a hybrid cloud framework for medical record sharing [PDF]
The fragmentation of patient data across multiple healthcare institutions presents a significant challenge to realizing timely and effective treatment.
Mona Abughazalah +3 more
doaj +2 more sources
Optoelectronic polymer memristors with dynamic control for power-efficient in-sensor edge computing [PDF]
As the demand for edge platforms in artificial intelligence increases, including mobile devices and security applications, the surge in data influx into edge devices often triggers interference and suboptimal decision-making. There is a pressing need for
Jia Zhou +13 more
doaj +2 more sources
Smart phosphor with neuromorphic behaviors enabling full-photoluminescent Write and Read for all-optical physical reservoir computing [PDF]
The unprecedented growth in information across diverse media drives an urgent need for multifunctional materials and devices beyond conventional electrical paradigms.
Yifei Zhao +11 more
doaj +2 more sources
Fast Fourier transform for fingerprint enhancement and features extraction with adaptive block size using orientation fields [PDF]
Extracting minutiae from a digital fingerprint is a crucial step in a fingerprint-based recognition systems. This work deals with poor-quality fingerprint images containing broken ridges.
Amina Ait Aoudia +2 more
doaj +1 more source
Verifiable Computing Using Computation Fingerprints Within FHE [PDF]
We suggest using Fully Homomorphic Encryption (FHE) to be used, not only to keep the privacy of information but also, to verify computations with no additional significant overhead, using only part of the variables length for verification. This method supports the addition of encrypted values as well as multiplication of encrypted values by the ...
Dolev, Shlomi, Kalma, Arseni
openaire +2 more sources
COLLABORATIVE Wi-Fi FINGERPRINTING INDOOR POSITIONING USING NEAR RELATION [PDF]
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment.
Y. Wang +4 more
doaj +1 more source
Indoor Location Algorithm Based on CSI Phase Difference Correction [PDF]
Aiming at the problems of phase error offset,high fingerprint noise and low accuracy of sample classification in most of the existing indoor passive fingerprint location methods based on Channel State Information(CSI) in complex scenes,an indoor ...
DANG Xiaochao,REN Jiaju,HAO Zhanjun
doaj +1 more source
The separation of sensor, memory, and processor in a recognition system deteriorates the latency of decision-making and increases the overall computing power. Here, Zhang et al.
Zhongfang Zhang +9 more
doaj +1 more source
Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data
Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD).
Alexander Kirfel +3 more
doaj +1 more source

