Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 27,674
21.
  • Over 100x Faster Bootstrapp... Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
    Jung, Wonkyung; Kim, Sangpyo; Ahn, Jung Ho ... IACR transactions on cryptographic hardware and embedded systems, 08/2021, Volume: 2021, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Fully Homomorphic encryption (FHE) has been gaining in popularity as an emerging means of enabling an unlimited number of operations in an encrypted message without decryption. A major drawback of ...
Full text
Available for: NUK, UL, UM

PDF
22.
  • A Machine Learning Algorith... A Machine Learning Algorithms for Detecting Phishing Websites: A Comparative Study
    Mohanned A.Taha; Haider D. A.Jabar; Widad K/Mohammed Iraqi Journal for Computer Science and Mathematics, 07/2024, Volume: 5, Issue: 3
    Journal Article
    Peer reviewed
    Open access

     Phishing website attacks are a type of cyber-attack in which perpetrators create fraudulent websites that mimic legitimate platforms, such as online banking or social media, with the intent of ...
Full text
Available for: NUK, UL, UM, UPUK
23.
  • GIS-based groundwater poten... GIS-based groundwater potential mapping in Shahroud plain, Iran. A comparison among statistical (bivariate and multivariate), data mining and MCDM approaches
    Arabameri, Alireza; Rezaei, Khalil; Cerda, Artemi ... Science of the total environment, 03/2019, Volume: 658
    Journal Article
    Peer reviewed
    Open access

    In arid and semi-arid areas, groundwater resource is one of the most important water sources by the humankind. Knowledge of groundwater distribution over space, associated flow and basic exploitation ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
24.
  • Effects of protection and r... Effects of protection and restoration on reducing ecological vulnerability
    Li, Qiang; Shi, Xueyi; Wu, Qingqing The Science of the total environment, 03/2021, Volume: 761
    Journal Article
    Peer reviewed

    Quantitative assessment and long-term analysis of ecological vulnerability can effectively grasp the driving factors of environmental change, which is of great significance for ecological protection ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
25.
  • Selection of Econometric In... Selection of Econometric Instruments when Building a Scoring Model Based on Dummy Variables
    Savina, Svitlana S.; Vodzyanova, Natalia K.; Bilyk, Tetiana O. ... Bìznes ìnform/Bìznes ìnform, 06/2023, Volume: 6, Issue: 545
    Journal Article
    Peer reviewed
    Open access

    The aim of the study is to select adequate econometric instruments for building a scoring model on a specific array of initial data, which contains the vast majority of fictitious variables. Despite ...
Full text
Available for: NUK, UL, UM, UPUK
26.
  • Public transport versus sol... Public transport versus solo travel mode choices during the COVID-19 pandemic: Self-reported evidence from a developing country
    Abdullah, Muhammad; Ali, Nazam; Javid, Muhammad Ashraf ... Transportation engineering, September 2021, 2021-09-00, 2021-09-01, Volume: 5
    Journal Article
    Peer reviewed
    Open access

    •Public transport vehicles could be hotspots for virus transmission during pandemics.•A binary logistic regression model was developed to explain mode choice during COVID-19.•Compared to males ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
27.
  • An alternative way to predi... An alternative way to predict knowledge hiding: The lens of transformational leadership
    Scuotto, Veronica; Nespoli, Chiara; Tran, Phuong Tra ... Journal of business research, 02/2022, Volume: 140
    Journal Article
    Peer reviewed

    The present study explores one of the biggest causes of the lack of organizational knowledge creation: knowledge hiding (KH). KH can be provoked by the deviant and detached behaviours of leaders ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
28.
  • A discrete particle swarm o... A discrete particle swarm optimization method for feature selection in binary classification problems
    Unler, Alper; Murat, Alper European journal of operational research, 11/2010, Volume: 206, Issue: 3
    Journal Article
    Peer reviewed

    This paper investigates the feature subset selection problem for the binary classification problem using logistic regression model. We developed a modified discrete particle swarm optimization (PSO) ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
29.
  • Factors increasing the risk... Factors increasing the risk for a severe reaction in anaphylaxis: An analysis of data from The European Anaphylaxis Registry
    Worm, M.; Francuzik, W.; Renaudin, J.‐M. ... Allergy, June 2018, Volume: 73, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Background Preventive measures to decrease the frequency and intensity of anaphylactic events are essential to provide optimal care for allergic patients. Aggravating factors may trigger or increase ...
Full text
Available for: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
30.
Full text
Available for: UL
1 2 3 4 5
hits: 27,674

Load filters