Results 41 to 50 of about 9,492,518 (363)

HBTBD: A Heterogeneous Bitcoin Transaction Behavior Dataset for Anti-Money Laundering

open access: yesApplied Sciences, 2023
In this paper, we predict money laundering in Bitcoin transactions by leveraging a deep learning framework and incorporating more characteristics of Bitcoin transactions.
Jialin Song, Yijun Gu
doaj   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

Lightweight Security for Network Coding

open access: yes, 2008
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao   +2 more
core   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

DyCARS: A dynamic context-aware recommendation system

open access: yesMathematical Biosciences and Engineering
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou   +7 more
doaj   +1 more source

Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]

open access: yes, 2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo   +3 more
core   +3 more sources

Molecular characterisation of human penile carcinoma and generation of paired epithelial primary cell lines

open access: yesMolecular Oncology, EarlyView.
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad   +12 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks

open access: yesIEEE Access, 2020
The chemical terrorist attack is a type of unconventional terrorism that threatens the safety of cities. This kind of terrorist attack is highly concealed and difficult to be detected.
Rongchen Zhu   +3 more
doaj   +1 more source

Measurement-device-independent quantum communication with an untrusted source [PDF]

open access: yes, 2015
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core   +2 more sources

Home - About - Disclaimer - Privacy