Search alternatives:
like » life (Expand Search)
Showing 1,441 - 1,460 results of 5,467 for search 'data processing like', query time: 0.14s Refine Results
  1. 1441

    Keying Merkle-Damgård at the Suffix by Bart Mennink

    Published 2025-03-01
    “…We finally investigate the security of these constructions in the leaky setting, and demonstrate that the suffix keyed Merkle-Damgård construction is not leakage resilient, but the suffix blinded Merkle-Damgård construction is leakage resilient as long as an appropriate padding rule is adopted and as long as the underlying building blocks are processing secret data in a leakage resilient manner. …”
    Get full text
    Article
  2. 1442
  3. 1443

    AgrUNet: A Multi-GPU UNet Based Model for Crops Classification by Andrea Miola, Enrico Calore, Sebastiano Fabio Schifano

    Published 2024-01-01
    “…The deployment of high-resolution satellite missions, like LandSat and Copernicus Sentinel, combined with AI Deep Learning (DL) methodologies has revolutionized Earth Observation science, enabling studies on yield predictions, soil classifications, and crop mappings on large areas, and the analysis and processing of Big Data using innovative approaches. …”
    Get full text
    Article
  4. 1444

    Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective by Bowen Jiang, Xiang Chen, Xiaoxin Pan, Li Tao, Yuangqiang Huang, Jiahao Tang, Xiaoqing Li, Peixiong Wang, Guokun Ma, Jun Zhang, Hao Wang

    Published 2025-01-01
    “…Additionally, the potential of MHPs memristors in data processing, physical encryption devices, artificial synapses, and brain‐like computing advancement of MHPs memristors is evaluated. …”
    Get full text
    Article
  5. 1445

    Audio-in-Image Steganography Using Analysis and Resynthesis Sound Spectrograph by A. Aravind Krishnan, Yukta Ramesh, Udbhav Urs, Megha Arakeri

    Published 2025-01-01
    “…This is problematic because learning models often plateau at a certain level of accuracy, making further improvements difficult. Audio steganography, like other forms of steganography, is vulnerable to data malleability and requires solutions that offer customisable security features while maintaining robustness. …”
    Get full text
    Article
  6. 1446

    Koopman-Driven Grip Force Prediction Through EMG Sensing by Tomislav Bazina, Ervin Kamenar, Maria Fonoberova, Igor Mezic

    Published 2025-01-01
    “…Influential parameters were subsequently identified through sensitivity analysis. Leveraging a novel data-driven Koopman-based approach and problem-specific data lifting, we devised a method for the estimation and short-term prediction of grip force from processed sEMG signals. …”
    Get full text
    Article
  7. 1447

    Pupillary responses to masked and gaze-averted faces by Cansu Malak, Cansu Malak, Funda Yildirim

    Published 2025-08-01
    “…So far, little is known about how gaze and masks influence emotion processing via physiological measures like pupil size. …”
    Get full text
    Article
  8. 1448
  9. 1449

    Indonesian Voice Cloning Text-to-Speech System With Vall-E-Based Model and Speech Enhancement by Hizkia Raditya Pratama Roosadi, Rizki Rivai Ginanjar, Dessi Puji Lestari

    Published 2024-01-01
    “…The development also emphasizes the importance of factors like the number of speakers, data selection, processing components, modeling, and speech duration during training for synthesis quality.…”
    Get full text
    Article
  10. 1450

    Mitigating cloud vulnerabilities using a blockchain platform by Dina Zoughbi, Kavitha Venkatachalam

    Published 2025-04-01
    “…It integrates multimodal data, including text and audio, to improve retrieval accuracy. …”
    Get full text
    Article
  11. 1451

    Efforts to Combat Criminal Acts of Unlicensed Cosmetics Distribution in Makassar City by Sutiawati, Jasmaniar

    Published 2024-03-01
    “…Conducted at the Sub Directorate 1 of Trade Industry of the Special Criminal Investigation Directorate of South Sulawesi Police and the Makassar Food and Drug Monitoring Center (BPOM), the study utilizes primary data gathered through informant interviews and secondary data from various sources like laws, regulations, and research findings. …”
    Get full text
    Article
  12. 1452

    Harmonic Analysis via an Integral Equation: An Application to Dengue Transmission by R. G. U. I. Meththananda, N. C. Ganegoda, S. S. N. Perera

    Published 2020-01-01
    “…This is a new approach in the harmonic analysis as we are able to interpret phenomena with damping and amplifying oscillations other than classical Fourier-like periodic waves. The proposed technique is tested with a data set of dengue incidence, where different types of influences prevail. …”
    Get full text
    Article
  13. 1453

    Editorial: Artificial Intelligence and Cybersecurity in Pervasive Computing by Ji-Jian Chin

    Published 2024-10-01
    “…AI can improve detection, prediction, and anticipative responses to human needs, while cybersecurity addresses topics like misuse prevention, ethics, policies, and governance. …”
    Get full text
    Article
  14. 1454

    A Survey on Privacy-Preserving Machine Learning Inference by Stanisław Barański

    Published 2025-07-01
    “… This paper examines methods to secure machine learning inference (ML inference) so that sensitive data remains private and proprietary models are protected during remote processing. …”
    Get full text
    Article
  15. 1455

    Når børn og unge pålægges sagsomkostninger i straffesager by Kasper Jørgensen, Emilie Thage, Annette Olesen

    Published 2023-10-01
    “…Abstract In Denmark, juveniles (aged 15-17) – like adults – are required to repay the Treasury for necessary expenses incurred in the processing of their criminal cases. …”
    Get full text
    Article
  16. 1456

    Exploration of crowdsourcing in information extraction from remote sensing images by Jianghua ZHAO, Xuezhi WANG, Qinghui LIN, Jianhui LI, Yuanchun ZHOU

    Published 2016-11-01
    “…Based on geospatial data cloud(GSCloud),the application of crowdsourcing in large scale information extraction from satellite images was studied,and a systematic architecture of this paradigm was proposed.By performing an experiment of extracting lakes on Qinghai-Tibetan plateau from landsat images,various aspects of the paradigm like the incentive mechanism,task assignment method,task division and many others were explored.Results show that paying part of the reward in advance and assigning a task to a team instead of individuals do not help attracting more applicants and improving the quality of results.And the accumulation of talents is of critical importance to obtain high-quality task results.Since this paradigm integrates crowdsourcing and machine computing power,and it is generic,it can be applied in more massive remote sensing image processing work which requires much human intervention.…”
    Get full text
    Article
  17. 1457

    ECONOMIC ANALYSIS OF THE TYPICAL RURAL AREAS IN BULGARIA by Emil MUTAFOV, Yuliyana YARKOVA

    Published 2023-01-01
    “…The research is based on the official national statistics in Bulgaria and Eurostat. After processing the data, main results are showing higher statistical values in some of the analysed parameters, like GDP and average output of non-financial enterprises. …”
    Get full text
    Article
  18. 1458

    From discovery to delivery: Governance of AI in the pharmaceutical industry by Stephanie Pasas-Farmer, Rashi Jain

    Published 2025-06-01
    “…Artificial Intelligence (AI) is revolutionizing the pharmaceutical industry, significantly enhancing drug discovery, patient care, and operational efficiency. Key AI technologies like machine learning, deep learning, natural language processing, and computer vision are transforming pharmaceutical practices. …”
    Get full text
    Article
  19. 1459

    Spiking Neural Networks for Multimodal Neuroimaging: A Comprehensive Review of Current Trends and the NeuCube Brain-Inspired Architecture by Omar Garcia-Palencia, Justin Fernandez, Vickie Shim, Nicola Kirilov Kasabov, Alan Wang, the Alzheimer’s Disease Neuroimaging Initiative

    Published 2025-06-01
    “…However, traditional artificial neural networks (ANNs) face challenges in processing spatiotemporal neuroimaging data due to their limited temporal memory and high computational demands. …”
    Get full text
    Article
  20. 1460

    Frequency of Pre-Analytical Errors and Its Causes in Glucose Specimen Collection: A Cross-Sectional Analysis in Bahawal Victoria Hospital, Pakistan by Hafiza Asma Hafiz, Muhammad Umair Naseer, Seemi Tanvir, Raima Kalhoro, Misbah Hafeez, Memona Zia

    Published 2025-07-01
    “…During the data collection process, quality control procedures were in place to ensure accuracy and consistency.  …”
    Get full text
    Article