UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

2 3 4 5 6
hits: 57
31.
  • Comparative analysis of rev... Comparative analysis of reversible data hiding schemes
    Jose, Asha; Subramaniam, Kamalraj IET image processing, 08/2020, Volume: 14, Issue: 10
    Journal Article
    Peer reviewed

    The data hiding method embeds the data into covers such as video, audio, and images, which are used for integrity authentication, media protection, communication covert, copyright protection etc. In ...
Full text
32.
  • Secrecy outage of a multi-r... Secrecy outage of a multi-relay cooperative communication network with accumulation of harvesting energy at relays
    Sharma, Shashibhushan; Roy, Sanjay Dhar; Kundu, Sumit IET communications, 11/2019, Volume: 13, Issue: 18
    Journal Article
    Peer reviewed
    Open access

    Security of confidential data at the physical layer has been analysed in a network where the source sends the confidential data to the destination via multiple energy harvesting decode and forward ...
Full text

PDF
33.
Full text

PDF
34.
  • The Data Tags Suite (DATS) ... The Data Tags Suite (DATS) model for discovering data access and use requirements
    Alter, George; Gonzalez-Beltran, Alejandra; Ohno-Machado, Lucila ... Gigascience, 02/2020, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Abstract Background Data reuse is often controlled to protect the privacy of subjects and patients. Data discovery tools need ways to inform researchers about restrictions on data access and re-use. ...
Full text

PDF
35.
  • Aligning restricted access ... Aligning restricted access data with FAIR: a systematic review
    Martorana, Margherita; Kuhn, Tobias; Siebes, Ronald ... PeerJ. Computer science, 07/2022, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Understanding the complexity of restricted research data is vitally important in the current new era of Open Science. While the FAIR Guiding Principles have been introduced to help researchers to ...
Full text
36.
  • MATHEMATICAL SOFTWARE FOR D... MATHEMATICAL SOFTWARE FOR DETECTING CONFIDENTIAL DATA IN ELECTRONIC DOCUMENTS
    Ptitsin A. A Naucnyj zurnal Kubanskogo gosudarstvennogo agrarnogo universiteta, 04/2016
    Journal Article
    Peer reviewed

    In the article, we develop the software for process of confidential data detection based on the knowledge bases technology. The algorithm of detection of confidential data in the electronic documents ...
Full text
37.
Full text

PDF
38.
Full text

PDF
39.
  • The Gra.fo project: from collection to dissemination
    Silvia Calamai; Francesca Biliotti Umanistica Digitale, 10/2017, Volume: 1, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Oral archives collected by professional scholars and ordinary people interested in dialects and ethnology are a precious resource for various fields of study (from linguistics to anthropology, from ...
Full text
40.
  • MaskDensity14: An R package... MaskDensity14: An R package for the density approximant of a univariate based on noise multiplied data
    Lin, Yan-Xia; Fielding, Mark James SoftwareX, December 2015, 2015-12-00, 2015-12-01, Volume: 3-4
    Journal Article
    Peer reviewed
    Open access

    Lin (2014) developed a framework of the method of the sample-moment-based density approximant, for estimating the probability density function of microdata based on noise multiplied data. ...
Full text

PDF
2 3 4 5 6
hits: 57

Load filters