Results 271 to 280 of about 1,648,250 (343)
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. [PDF]
Xie Q, Ding Z.
europepmc +1 more source
Efficient phrase search with reliable verification over encrypted cloud-IoT data. [PDF]
Xu W, Zhu Z, Khalid MI.
europepmc +1 more source
Deep hashing and attention mechanism-based image retrieval of osteosarcoma scans for diagnosis of bone cancer. [PDF]
Zeng T+10 more
europepmc +1 more source
ABSTRACT Sedimentary infill patterns in the Eastern Gobi Basin of southern Mongolia record a complex, polyphased history. Asynchronous timing and intensities of extensional tectonism during the Early Cretaceous fragmented the Eastern Gobi Basin into a series of sub‐basins within an extensional rift (horst‐graben) setting, which likely infilled ...
Jesse Benjamin van Niekerk+7 more
wiley +1 more source
Causal Discovery and Reasoning for Continuous Variables with an Improved Bayesian Network Constructed by Locality Sensitive Hashing and Kernel Density Estimation. [PDF]
Wei C+6 more
europepmc +1 more source
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi+3 more
wiley +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Abstract Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping+4 more
wiley +1 more source
Research on time-division multiplexing for error correction and privacy amplification in post-processing of quantum key distribution. [PDF]
Chen L, Chen XM, Yan YL.
europepmc +1 more source