Showing 121 - 140 results of 241 for search '"data structures"', query time: 0.05s Refine Results
  1. 121

    HaVec: An Efficient de Bruijn Graph Construction Algorithm for Genome Assembly by Md Mahfuzer Rahman, Ratul Sharker, Sajib Biswas, M. Sohel Rahman

    Published 2017-01-01
    “…To this end, the de Bruijn graph is a popular data structure in the genome assembly literature for efficient representation and processing of data. …”
    Get full text
    Article
  2. 122

    Towards Dynamic Remote Data Auditing in Computational Clouds by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar

    Published 2014-01-01
    “…Moreover, this data structure empowers our method to be applicable for large-scale data with minimum computation cost. …”
    Get full text
    Article
  3. 123

    Privacy and Biometric Passports by Ioannis Vakalis

    Published 2011-01-01
    “…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
    Get full text
    Article
  4. 124

    Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network by Xia-an Bi, Xiaohui Wang, Luyun Xu, Sheng Chen, Hong Liu

    Published 2015-01-01
    “…In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. …”
    Get full text
    Article
  5. 125

    Enhancing Cluster Accuracy in Diabetes Multimorbidity With Dirichlet Process Mixture Models by Francis John Kita, Srinivasa Rao Gaddes, Peter Josephat Kirigiti

    Published 2025-01-01
    “…This study addresses this gap by applying the Dirichlet Process Mixture Model (DPMM), a non-parametric clustering approach that does not require specifying cluster numbers and adapts dynamically to the underlying data structure. The major advantages of DPMM include (1) DPMM automatically adjusts the number of clusters based on data structure, enabling it to capture diverse patient profiles without needing predefined cluster counts, which is ideal for handling the variability in multimorbidity patterns; (2) DPMM estimates the distributional properties directly from the data, relying on proper parameter choices and improving the stability of clustering results across datasets; and (3) DPMM uses a Bayesian framework to iteratively converge toward optimal clustering solutions, efficiently managing large datasets and producing more clinically meaningful clusters. …”
    Get full text
    Article
  6. 126

    Editorial by Koen Matthijs, Paul Puschmann

    Published 2015-05-01
    “…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
    Get full text
    Article
  7. 127

    Research and implement on segmenting storage model of netflow by WU Guang-jun1, YUN Xiao-chun2, YU Xiang-zhan1, WANG Shu-peng2

    Published 2007-01-01
    “…A new model was proposed to maintain sequence and ownership of netflow.This model adopted weak se-quence-based high speed data structure in memory to improve real time storage ability.In the disc level a multi-level in-dex data netflow spanning tree was proposed to improve sequence and ownership retrieval efficiency.The performance of evaluation exposes that the storage model of netflow can improve real-time storage ability and decrease the quantities of index data dramatically.…”
    Get full text
    Article
  8. 128

    Editorial by Koen Matthijs, Paul Puschmann

    Published 2015-05-01
    “… Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
    Get full text
    Article
  9. 129

    Editorial by Koen Matthijs, Paul Puschmann

    Published 2015-05-01
    “…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
    Get full text
    Article
  10. 130

    Editorial by Koen Matthijs, Paul Puschmann

    Published 2015-05-01
    “…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
    Get full text
    Article
  11. 131

    Editorial by Koen Matthijs, Paul Puschmann

    Published 2015-05-01
    “…Historical Life Course Studies, a journal in population studies, aims to stimulate and facilitate the implementation of IDS (Intermediate Data Structure, a standard data format for large historical databases), and to publish the results from (comparative) research with the help of large historical databases. …”
    Get full text
    Article
  12. 132

    CP-ABE based data access control for cloud storage by SUN Guo-zi1, DONG Yu1, LI Yun1

    Published 2011-01-01
    “…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
    Get full text
    Article
  13. 133

    P2P network identity authentication mechanism based on trusted alliance by Yingying CHEN, Feng ZHANG, Wenbao JIANG, Xu ZHOU

    Published 2020-04-01
    “…In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.…”
    Get full text
    Article
  14. 134

    Hardware Trojans detection based on projection pursuit by Peng ZHANG, Xin-cheng WANG, Qing ZHOU

    Published 2013-04-01
    “…A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension special rules without obvious i tion loss,so as to attain the goal of feature abstraction and identification on side channel signals of IC chips.The detection experiment against an exemplary AES-128 hardware Trojan circuit showed that the technique could distinguish the difference of side channel signal's feature between the genuine chip and tested chip,and consequently could detect the existence of the hardware Trojan.…”
    Get full text
    Article
  15. 135

    Open service platform for IoT by Hao RONG, GLingyun JIAN

    Published 2016-02-01
    “…Currently,there are still some problems with IoT,specifically in:one is that the IoT gives priority to vertical service system;another is the lack of cross-system resource sharing.To solve the above problems,a scalable intelligence service architecture of IoT in which a unified service data model was proposed and a message middleware were built to overcome the multi-source heterogeneous problems in the data structure,data platforms and operating systems. In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
    Get full text
    Article
  16. 136

    Approximate algorithm for median query based on WSN by LIU Cai-ping1, MAO Jian-xu2, LI Ren-fa1, FU Bin1

    Published 2011-01-01
    “…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
    Get full text
    Article
  17. 137

    Supply chain innovation and financial performance in ASEAN manufacturing firms: The moderating role of organisational innovation by Minh Hue Nguyen, Hang Thu Hoang, Dung Van Nguyen, Canh Huynh Quang Trinh

    Published 2024-09-01
    “…We employ the multilevel mixed-effects linear model to analyse the hierarchical data structure. The results confirm the important role of supply chain innovation in improving firms’ financial performance in ASEAN countries. …”
    Get full text
    Article
  18. 138

    An autonomous navigation method for orchard mobile robots based on octree 3D point cloud optimization by Hailong Li, Hailong Li, Hailong Li, Kai Huang, Kai Huang, Yuanhao Sun, Yuanhao Sun, Xiaohui Lei, Xiaohui Lei, Quanchun Yuan, Quanchun Yuan, Jinqi Zhang, Xiaolan Lv, Xiaolan Lv

    Published 2025-01-01
    “…To address these issues, this paper proposes a 3D point cloud optimization method based on the octree data structure for autonomous navigation of orchard mobile robots. …”
    Get full text
    Article
  19. 139

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  20. 140

    Research on the programming language for proxy re-encryption by Mang SU, Yan YU, Bin WU, Anmin FU

    Published 2018-06-01
    “…The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE,and obtain the programming code for computer.Firstly,the grammar of PLPRE was presented,including the definitions of the keyword and programming logic,then the ACC-PRE algorithm was described by PLPRE as an example.Secondly,the PLPRE parser was realized by ANTLR.Finally,the comparisons between the PLPRE and the related work were made.By using the PLPRE,user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus,PLPRE will decrease the deviation between the design and implement for PRE.…”
    Get full text
    Article