Results 141 to 150 of about 154,141 (333)

A Novel Flexible Kernel Density Estimator for Multimodal Probability Density Functions

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Estimating probability density functions (PDFs) is critical in data analysis, particularly for complex multimodal distributions. traditional kernel density estimator (KDE) methods often face challenges in accurately capturing multimodal structures due to their uniform weighting scheme, leading to mode loss and degraded estimation accuracy ...
Jia‐Qi Chen   +5 more
wiley   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

IP address lookup using a dynamic hash function [PDF]

open access: green, 2006
Xiaojun Nie   +4 more
openalex   +1 more source

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Can There Be a Two Way Hash Function?

open access: yesIEEE Access
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj   +1 more source

Forensic analysis and evaluation of file‐wiping applications in Android OS

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh   +6 more
wiley   +1 more source

Incremental hash functions

open access: yes, 2014
Özet Fonksiyonları daha çok veri bütünlüğünde ve elektronik imza gibi kimlik doğrulamada kullanılan kriptolojinin en önemli araçlardan biridir. Bu fonksiyonlar, herhangi bir uzunluktaki girdiyi belli özelliklerle sıkıştırarak sabit bir uzunluktaki çıktıya götürler.
openaire   +3 more sources

wholeskim: Utilising Genome Skims for Taxonomically Annotating Ancient DNA Metagenomes

open access: yesMolecular Ecology Resources, EarlyView.
ABSTRACT Inferring community composition from shotgun sequencing of environmental DNA is highly dependent on the completeness of reference databases used to assign taxonomic information as well as the pipeline used. While the number of complete, fully assembled reference genomes is increasing rapidly, their taxonomic coverage is generally too sparse to
Lucas Elliott   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy