Suggested Topics within your search.
Suggested Topics within your search.
-
5361
-
5362
Security and privacy within smart cities
Published 2025-01-01“…The global trend of increasing urbanization and expansion of cities in recent decades has caused numerous problems in their functioning. The rapid development of information and communication technologies has emerged as a solution to these problems and led to the emergence of so-called smart cities. …”
Get full text
Article -
5363
Large-scale integration of meta-QTL and genome-wide association study identifies genomic regions and candidate genes for photosynthetic efficiency traits in bread wheat
Published 2025-03-01“…Of these, 54 MQTLs were validated using genome-wide association study (GWAS) data from different natural populations in previous research. …”
Get full text
Article -
5364
Sistem Informasi Pendataan Atlet Berbasis Web Di Koni Kabupaten Pesisir Selatan
Published 2025-08-01“…Testing was carried out using the Black Box Testing method, and the results showed that all system functions operated as intended, including athlete and coach data management, training schedules, and report generation. …”
Get full text
Article -
5365
Exploring the Potential of Neural Networks to Predict Statistics of Solar Wind Turbulence
Published 2022-09-01“…Abstract Time series data sets often have missing or corrupted entries, which need to be handled in subsequent data analysis. …”
Get full text
Article -
5366
Intersecting Realms: Examining the Convergence of Vision and AI in Extended Reality Graphics
Published 2025-01-01Get full text
Article -
5367
Suivis de l’efficacité des actions de restauration écologique : comment améliorer leur exploitabilité et leur pérennité ?
Published 2024-12-01“…On the other hand, the conditions under which the protocols were applied changed from one monitoring session to the next, modifying the sampling plan and possibly complicating or preventing the analysis of the data collected. The publication of new protocols and differences in practice between monitoring organisations may explain some of the observed changes. …”
Get full text
Article -
5368
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article -
5369
Digital Competence of Young Adults in Poland
Published 2024-09-01“…Digital transformation is a challenge for many areas of modern society functioning. The effects of digitalisation are particularly noticeable in the labour market and are expressed, among others, in new requirements of employers both for professionally active people and those entering the labour market. …”
Get full text
Article -
5370
The effect of benralizumab on inflammation in severe asthma: a real-life analysis
Published 2024-12-01Get full text
Article -
5371
Design and development of SHINE accelerator fast interlock system
Published 2024-12-01“…Finally, based on Experimental Physics and Industrial Control System (EPICS), the design of operation mode, system architecture and data transmission were implemented and deployed.ResultsThe accelerator interlocking system developed in this study enables data exchange and expansion between fast and slow interlocks, as well as between any station. …”
Get full text
Article -
5372
Real-Time DTM Generation with Sequential Estimation and OptD Method
Published 2025-04-01“…Since DTM generation occurs simultaneously with data acquisition, the proposed algorithm also incorporates data reduction techniques to manage the large dataset. …”
Get full text
Article -
5373
Spatial-Spectral Linear Extrapolation for Cross-Scene Hyperspectral Image Classification
Published 2025-05-01Get full text
Article -
5374
Linguistics Specificity of Universities Prospectuses: A Corpus-Based Genre Analysis
Published 2025-03-01“…The investigation of the data utilized theoretical frameworks, including Hyland's (2009) specificity model alongside Biber's (1993) multidimensional analysis model. …”
Get full text
Article -
5375
Health-Related Quality-of-Life Utility Values in Adults With Late-Onset Pompe Disease: Analyses of EQ-5D Data From the PROPEL Clinical Trial
Published 2024-09-01“… # Conclusions Overall, the results from our analysis indicate that important HRQoL losses are associated with reductions in mobility and respiratory function for patients with Pompe disease. …”
Get full text
Article -
5376
Brain Connectivity Yields Insights into the Pathogenesis of Epilepsy and Subtypes: Evidence from Mendelian Randomization Analysis
Published 2025-01-01“…However, the causal relationship between epilepsy and structural connectivity (SC)/functional connectivity (FC) within RSNs remain unclear. …”
Get full text
Article -
5377
The experience of virtualization and university culture: A qualitative study of Tehran universities
Published 2022-09-01“…Participants were purposefully selected from among students, graduates, faculty members, and university administrators. Data were analyzed using the thematic analysis technique which resulted in 10 semantic clusters. …”
Get full text
Article -
5378
Gene2role: a role-based gene embedding method for comparative analysis of signed gene regulatory networks
Published 2025-05-01Get full text
Article -
5379
Exploring Media Relations: Discourse Analysis of PR-Media Conversations in Philippine Media Events
Published 2025-06-01“…The recordings were transcribed and analysed using two approaches to discourse analysis in communication: Ethnography of Communication and Conversation Analysis. …”
Get full text
Article -
5380
Cerebrospinal fluid data compilation and knowledge-based interpretation of bacterial, viral, parasitic, oncological, chronic inflammatory and demyelinating diseases. Diagnostic pat...
Published 2016-04-01“…The compilation with complementary parameters (barrier function, i.e., CSF flow rate, cytology, lactate, antibodies) in a cumulative CSF data report allows a knowledge-based interpretation and provides analytical and medical plausibility for the quality assessment in CSF laboratories. …”
Get full text
Article