-
121
HaVec: An Efficient de Bruijn Graph Construction Algorithm for Genome Assembly
Published 2017-01-01“…To this end, the de Bruijn graph is a popular data structure in the genome assembly literature for efficient representation and processing of data. …”
Get full text
Article -
122
Towards Dynamic Remote Data Auditing in Computational Clouds
Published 2014-01-01“…Moreover, this data structure empowers our method to be applicable for large-scale data with minimum computation cost. …”
Get full text
Article -
123
Privacy and Biometric Passports
Published 2011-01-01“…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
Get full text
Article -
124
Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network
Published 2015-01-01“…In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. …”
Get full text
Article -
125
Enhancing Cluster Accuracy in Diabetes Multimorbidity With Dirichlet Process Mixture Models
Published 2025-01-01“…This study addresses this gap by applying the Dirichlet Process Mixture Model (DPMM), a non-parametric clustering approach that does not require specifying cluster numbers and adapts dynamically to the underlying data structure. The major advantages of DPMM include (1) DPMM automatically adjusts the number of clusters based on data structure, enabling it to capture diverse patient profiles without needing predefined cluster counts, which is ideal for handling the variability in multimorbidity patterns; (2) DPMM estimates the distributional properties directly from the data, relying on proper parameter choices and improving the stability of clustering results across datasets; and (3) DPMM uses a Bayesian framework to iteratively converge toward optimal clustering solutions, efficiently managing large datasets and producing more clinically meaningful clusters. …”
Get full text
Article -
126
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
127
Research and implement on segmenting storage model of netflow
Published 2007-01-01“…A new model was proposed to maintain sequence and ownership of netflow.This model adopted weak se-quence-based high speed data structure in memory to improve real time storage ability.In the disc level a multi-level in-dex data netflow spanning tree was proposed to improve sequence and ownership retrieval efficiency.The performance of evaluation exposes that the storage model of netflow can improve real-time storage ability and decrease the quantities of index data dramatically.…”
Get full text
Article -
128
Editorial
Published 2015-05-01“… Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
129
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
130
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
131
Editorial
Published 2015-05-01“…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
Get full text
Article -
132
CP-ABE based data access control for cloud storage
Published 2011-01-01“…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
Get full text
Article -
133
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01“…In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.…”
Get full text
Article -
134
Hardware Trojans detection based on projection pursuit
Published 2013-04-01“…A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension special rules without obvious i tion loss,so as to attain the goal of feature abstraction and identification on side channel signals of IC chips.The detection experiment against an exemplary AES-128 hardware Trojan circuit showed that the technique could distinguish the difference of side channel signal's feature between the genuine chip and tested chip,and consequently could detect the existence of the hardware Trojan.…”
Get full text
Article -
135
Open service platform for IoT
Published 2016-02-01“…Currently,there are still some problems with IoT,specifically in:one is that the IoT gives priority to vertical service system;another is the lack of cross-system resource sharing.To solve the above problems,a scalable intelligence service architecture of IoT in which a unified service data model was proposed and a message middleware were built to overcome the multi-source heterogeneous problems in the data structure,data platforms and operating systems. In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
Get full text
Article -
136
Approximate algorithm for median query based on WSN
Published 2011-01-01“…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
Get full text
Article -
137
Supply chain innovation and financial performance in ASEAN manufacturing firms: The moderating role of organisational innovation
Published 2024-09-01“…We employ the multilevel mixed-effects linear model to analyse the hierarchical data structure. The results confirm the important role of supply chain innovation in improving firms’ financial performance in ASEAN countries. …”
Get full text
Article -
138
An autonomous navigation method for orchard mobile robots based on octree 3D point cloud optimization
Published 2025-01-01“…To address these issues, this paper proposes a 3D point cloud optimization method based on the octree data structure for autonomous navigation of orchard mobile robots. …”
Get full text
Article -
139
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
140
Research on the programming language for proxy re-encryption
Published 2018-06-01“…The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE,and obtain the programming code for computer.Firstly,the grammar of PLPRE was presented,including the definitions of the keyword and programming logic,then the ACC-PRE algorithm was described by PLPRE as an example.Secondly,the PLPRE parser was realized by ANTLR.Finally,the comparisons between the PLPRE and the related work were made.By using the PLPRE,user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus,PLPRE will decrease the deviation between the design and implement for PRE.…”
Get full text
Article