Results 31 to 40 of about 28,128 (285)

Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics

open access: yesIEEE Access, 2022
Data privacy regulations like the EU GDPR allow the use of hashing techniques to anonymize data that may contain personal information. However, cryptographic hashing is well-known to destroy any possibility of performing analytics.
Abdelrahman Almahmoud   +2 more
doaj   +1 more source

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding

open access: yesAlgorithms, 2020
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original ...
Ling Du   +4 more
doaj   +1 more source

Secure Medical Blockchain Model

open access: yesInformation, 2023
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat   +4 more
doaj   +1 more source

E-Commerce Website Usability Analysis Using the Association Rule Mining and Machine Learning Algorithm

open access: yesMathematics, 2022
The overall effectiveness of a website as an e-commerce platform is influenced by how usable it is. This study aimed to find out if advanced web metrics, derived from Google Analytics software, could be used to evaluate the overall usability of e ...
Biresh Kumar   +4 more
doaj   +1 more source

On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2022
The job recruitment process takes a lot of process and number of documents. It is very well known for applicants to exaggerated and falsify their work history data. It may put a company at legal risk and significant commercial losses.
Bryan Andi Gerrardo   +2 more
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Deep Hashing Based on Class-Discriminated Neighborhood Embedding

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2020
Deep-hashing methods have drawn significant attention during the past years in the field of remote sensing (RS) owing to their prominent capabilities for capturing the semantics from complex RS scenes and generating the associated hash codes in an end-to-
Jian Kang   +4 more
doaj   +1 more source

HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS

open access: yesСистемный анализ и прикладная информатика, 2017
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult.
A. V. Sidorenko, I. V. Shakinko
doaj   +1 more source

Scalable IoT Platform for Heterogeneous Devices in Smart Environments

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is envisioned as a ubiquitous computing infrastructure in which everything becomes connected, enabling gigantic information exchange among Things and people.
Asad Javed   +3 more
doaj   +1 more source

Compression‐Tension‐Asymmetry and Stiffness Nonlinearity of Collagen‐Matrigel Composite Hydrogels

open access: yesAdvanced Healthcare Materials, EarlyView.
Self‐assembled collagen hydrogel matrices are widely used in tissue engineering applications. These matrices stiffen and contract laterally under tension due to fiber alignment and soften and collapse under compression due to fiber buckling. It is demonstrated that filler materials, such as Matrigel, linearize the mechanical behavior of collagen ...
David Böhringer   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy