UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

3 4 5 6 7
hits: 3,630
41.
  • Efficient and Secure Color ... Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree
    Elmenyawi, Marwa A.; Abdel Aziem, Nada M.; Bahaa-Eldin, Ayman M. Egyptian informatics journal, September 2024, 2024-09-00, 2024-09-01, Volume: 27
    Journal Article
    Peer reviewed
    Open access

    Recently, there has been a growing demand for image encryption techniques that offer robust protection and minimize processing time. The proposed paper proposes an efficient color image encryption ...
Full text
42.
  • On selecting a fraction of ... On selecting a fraction of leaves with disjoint neighborhoods in a plane tree
    Junginger, Kolja; Mantas, Ioannis; Papadopoulou, Evanthia Discrete Applied Mathematics, 10/2022, Volume: 319
    Journal Article
    Peer reviewed
    Open access

    We present a generalization of a combinatorial result by Aggarwal et al. (1989) on a linear-time algorithm that selects a constant fraction of leaves, with pairwise disjoint neighborhoods, from a ...
Full text
43.
  • Scalable revocable identity... Scalable revocable identity-based signature over lattices in the standard model
    Xie, Congge; Weng, Jian; Weng, Jiasi ... Information sciences, 20/May , Volume: 518
    Journal Article
    Peer reviewed

    Revocable identity based signature (RIBS) is a useful cryptographic primitive, which provides a revocation mechanism to revoke misbehaving or malicious users over ID-based public key settings. In the ...
Full text
44.
  • A partial binary tree DEA-D... A partial binary tree DEA-DA cyclic classification model for decision makers in complex multi-attribute large-group interval-valued intuitionistic fuzzy decision-making problems
    Liu, Bingsheng; Shen, Yinghua; Chen, Xiaohong ... Information fusion, July 2014, 2014-07-00, Volume: 18
    Journal Article
    Peer reviewed

    This paper proposes the idea of combining “interest groups” with the practical decision information to classify the decision makers (DMs) in complex multi-attribute large-group decision-making ...
Full text
45.
  • TeKET: a Tree-Based Unsuper... TeKET: a Tree-Based Unsupervised Keyphrase Extraction Technique
    Rabby, Gollam; Azad, Saiful; Mahmud, Mufti ... Cognitive computation, 07/2020, Volume: 12, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Automatic keyphrase extraction techniques aim to extract quality keyphrases for higher level summarization of a document. Majority of the existing techniques are mainly domain-specific, which require ...
Full text

PDF
46.
  • A binary-tree element subdi... A binary-tree element subdivision method for evaluation of nearly singular domain integrals with continuous or discontinuous kernel
    Zhang, Jianming; Chi, Baotao; Singh, Krishna M. ... Journal of computational and applied mathematics, 12/2019, Volume: 362
    Journal Article
    Peer reviewed

    An adaptive and efficient volume element subdivision method using binary tree for evaluation of nearly singular domain integrals with continuous or discontinuous kernel in three-dimensional (3-D) ...
Full text
47.
  • Linear extension operators ... Linear extension operators for Sobolev spaces on radially symmetric binary trees
    Fefferman, Charles; Klartag, Bo’az Advanced nonlinear studies, 06/2023, Volume: 23, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Let and suppose that we are given a function defined on the leaves of a weighted tree. We would like to extend to a function defined on the entire tree, so as to minimize the weighted -Sobolev norm ...
Full text
48.
  • The Strong Law of Large Num... The Strong Law of Large Numbers and the Entropy Ergodic Theorem for Nonhomogeneous Bifurcating Markov Chains Indexed by a Binary Tree
    Dang, Hui; Yang, Weiguo; Shi, Zhiyan IEEE transactions on information theory, 2015-April, 2015-4-00, 20150401, Volume: 61, Issue: 4
    Journal Article
    Peer reviewed

    Guyon (Guyon J. Limit theorems for bifurcating Markov chains. Application to the detection of cellular aging. Ann Appl Probab, 2007, 17: 1538-1569) introduced an important model for homogeneous ...
Full text
49.
  • One Versus All Binary Tree ... One Versus All Binary Tree Method to Classify Misbehaviors in Imbalanced VeReMi Dataset
    Slama, Omessaad; Tarhouni, Mounira; Zidi, Salah ... IEEE access, 2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    Nowadays, transportation networks depend heavily on the technology known as vehicular ad hoc networks (VANETs). VANETs enhance traffic control and road safety while also enabling vehicle-to-vehicle ...
Full text
50.
Full text
3 4 5 6 7
hits: 3,630

Load filters