Results 51 to 60 of about 1,500,333 (340)

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Advanced Microfluidics for Single Cell‐Based Cancer Research

open access: yesAdvanced Science, EarlyView.
Cutting‐edge microfluidic platforms are transforming single‐cell cancer research. This review highlights advanced technologies, from droplet microfluidics to tumour‐chips, that enable functional and spatial single‐cell analyses. By integrating biosensing, immune components, and patient‐derived materials, these systems offer new insights into tumour ...
Adriana Carneiro   +10 more
wiley   +1 more source

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +1 more source

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

open access: yesCyber Security and Applications, 2023
Cloud-edge healthcare system provides storage and computing functions at the hospital servers, bringing low latency for doctors and patients. However, hospital servers cannot be trusted and have limited computing resources.
Yi Li, Meiqin Tang
doaj   +1 more source

Harnessing Blockchain for Sustainable Business Strategy: A Case Study on Enhancing Accounting Practices

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone   +3 more
wiley   +1 more source

A hashing technique using separate binary tree

open access: yesData Science Journal, 2006
It is always a major demand to provide efficient retrieving and storing of data and information in a large database system. For this purpose, many file organization techniques have already been developed, and much additional research is still going on ...
Md Mehedi Masud   +3 more
doaj   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM

open access: yesTongxin xuebao, 2016
In OpenFlow networks,switches accept flow rules through standardized interfaces,and perform flow-based packet processing.To facilitate the lookup of flow tables,TCAM has been widely used in OpenFlow switches.However,TCAM is expensive and consumes a large
Chun-qiang LI   +2 more
doaj   +2 more sources

Taming m‐Quionodimethanes by Dispersion Force: Cyclodimerization of (Trialkylsilyl)Ethynyl‐Substituted Indeno[2,1‐b]Fluorenes and Fluoreno[2,3‐b]Fluorenes

open access: yesChemistry – A European Journal, EarlyView.
Indeno[2.1‐b]fluorenes and fluoreno[2,3‐b]fluorenes having (trialkylsilyl)ethynyl groups dimerize spontaneously to yield the cyclodimers in the yields ranging from virtually zero to quantitative depending on the alkyl group. The regioselectivity of the bond formation (Head versus Tail) is also dependent on the alkyl group.
Ching‐En Hung   +8 more
wiley   +1 more source

Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System

open access: yesGong-kuang zidonghua, 2012
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj  

Home - About - Disclaimer - Privacy