Results 111 to 120 of about 167,829 (332)
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao +4 more
doaj +1 more source
Realization of Open Addressing Hash Table in the Chained Allocated Memory [PDF]
In this article, we examine a realization of an open addressing hash table in the chained allocated memory, giving us the opportunity to decrease the number of linear probing when a given element has not been inserted in the ...
Dyankova, Valentina, Hristova, Rositza
core
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang +8 more
wiley +1 more source
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley +1 more source
Scalable Hash Table for NUMA Systems [PDF]
Alok Ranjan Tripathy, Oded Green
openalex +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Multi-stage hashing network storage structure for intelligent routing
Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design ...
Feng ZHU, Qun HUANG
doaj +2 more sources

