-
81
PERSONALIZATION OF BANKING SERVICES BASED ON OPEN SOURCE ANALYSIS VIA USE OF BIG DATA
Published 2018-06-01Subjects: Get full text
Article -
82
Scaled Fenwick Trees
Published 2023-01-01“…A novel data structure that enables the storage and retrieval of linear array numeric data with logarithmic time complexity updates, range sums, and rescaling is introduced and studied. …”
Get full text
Article -
83
A Fully Operational Framework for Handling Cellular Automata Templates
Published 2019-01-01“…The template data structure is defined, along with processes by which interesting templates can be built. …”
Get full text
Article -
84
How to structure data from an IoT monitoring network
Published 2020-12-01“…This publication discusses the typical attributes in IoT monitoring networks and presents a data structure that outlines best practices in organizing data. …”
Get full text
Article -
85
How to structure data from an IoT monitoring network
Published 2020-12-01“…This publication discusses the typical attributes in IoT monitoring networks and presents a data structure that outlines best practices in organizing data. …”
Get full text
Article -
86
HaVec: An Efficient de Bruijn Graph Construction Algorithm for Genome Assembly
Published 2017-01-01“…To this end, the de Bruijn graph is a popular data structure in the genome assembly literature for efficient representation and processing of data. …”
Get full text
Article -
87
Towards Dynamic Remote Data Auditing in Computational Clouds
Published 2014-01-01“…Moreover, this data structure empowers our method to be applicable for large-scale data with minimum computation cost. …”
Get full text
Article -
88
Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network
Published 2015-01-01“…In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. …”
Get full text
Article -
89
Enhancing Cluster Accuracy in Diabetes Multimorbidity With Dirichlet Process Mixture Models
Published 2025-01-01“…This study addresses this gap by applying the Dirichlet Process Mixture Model (DPMM), a non-parametric clustering approach that does not require specifying cluster numbers and adapts dynamically to the underlying data structure. The major advantages of DPMM include (1) DPMM automatically adjusts the number of clusters based on data structure, enabling it to capture diverse patient profiles without needing predefined cluster counts, which is ideal for handling the variability in multimorbidity patterns; (2) DPMM estimates the distributional properties directly from the data, relying on proper parameter choices and improving the stability of clustering results across datasets; and (3) DPMM uses a Bayesian framework to iteratively converge toward optimal clustering solutions, efficiently managing large datasets and producing more clinically meaningful clusters. …”
Get full text
Article -
90
Aggregate Queries in Wireless Sensor Networks
Published 2012-09-01“…Also, BPA uses a bucket-based data structure in aggregate query processing, and divides and conquers the bucket data structure adaptively according to the number of data in the bucket. …”
Get full text
Article -
91
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
92
Privacy and Biometric Passports
Published 2011-01-01“…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
Get full text
Article -
93
Editorial
Published 2015-05-01“… Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
94
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
95
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
96
Research and implement on segmenting storage model of netflow
Published 2007-01-01“…A new model was proposed to maintain sequence and ownership of netflow.This model adopted weak se-quence-based high speed data structure in memory to improve real time storage ability.In the disc level a multi-level in-dex data netflow spanning tree was proposed to improve sequence and ownership retrieval efficiency.The performance of evaluation exposes that the storage model of netflow can improve real-time storage ability and decrease the quantities of index data dramatically.…”
Get full text
Article -
97
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
98
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01“…In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.…”
Get full text
Article -
99
Hardware Trojans detection based on projection pursuit
Published 2013-04-01“…A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension special rules without obvious i tion loss,so as to attain the goal of feature abstraction and identification on side channel signals of IC chips.The detection experiment against an exemplary AES-128 hardware Trojan circuit showed that the technique could distinguish the difference of side channel signal's feature between the genuine chip and tested chip,and consequently could detect the existence of the hardware Trojan.…”
Get full text
Article -
100
Open service platform for IoT
Published 2016-02-01“…Currently,there are still some problems with IoT,specifically in:one is that the IoT gives priority to vertical service system;another is the lack of cross-system resource sharing.To solve the above problems,a scalable intelligence service architecture of IoT in which a unified service data model was proposed and a message middleware were built to overcome the multi-source heterogeneous problems in the data structure,data platforms and operating systems. In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
Get full text
Article