نتایج جستجو برای: access pattern
تعداد نتایج: 666151 فیلتر نتایج به سال:
Introduction: Reciving and using health care services is called utilization and access to services refers to the opportunity and the ability to use them. The purpose of this study was to investigate the pattern of utilization and access to health care disparities and factors affecting them. Methods: In this cross-sectional study, Quota sampling method was used. To evaluate the health care serv...
This paper describes Fido, a predictive cache [palmer 1990] that anticipates access by em ploying an associative memory to recognize regularities in access pattern for each isolated access context over time. Continual training adapts the associative memory contents to data base and access pattern changes, allowing on line access predictions for prefetcbing. We dis cuss two salient component...
In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...
In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...
In this paper, biometric security system for access control based on hand geometry is presented. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Experiments show that the physical dimensions of a human hand contain information that is capable to verify the identity of an individual. The database create...
Sequential pattern mining is the process of applying data mining techniques to a sequential database, to extract frequent subsequences to discover correlation that exists among the ordered list of events. Web Usage mining (WUM) discovers and extracts interesting knowledge/patterns from Web logs is one of the applications of Sequential Pattern Mining. In this paper, we present a survey of the se...
Handwritten Devanagari Numeral Recognition using Structural and Statistical Features 1 Madhav Goyal, 2 Naresh Kumar Garg 1 Department of Computer Science & Engg, Guru Ram Dass Institute of Engg. & Technology, Bathinda, Punjab, India 2 Department of Computer Science & Engg, GZSPTU Campus, Bathinda, Punjab, India ____________________________________________________________________________________...
A common assumption in cellular communications is the circular-cell approximation. In this paper, an alternative analysis based on the hexagonal shape of the cells is presented. A geometrical-based stochastic model is proposed to describe the angle of arrival of the interfering signals in the reverse link of a cellular system. Explicit closed form expressions are derived, and simulations perfor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید