نتایج جستجو برای: access pattern

تعداد نتایج: 666151  

Journal: :Journal of the Korea Institute of Information and Communication Engineering 2016

ژورنال: مدیریت سلامت 2015

Introduction: Reciving and using health care services is called utilization and access to services refers to the opportunity and the ability to use them. The purpose of this study was to investigate the pattern of utilization and access to health care disparities and factors affecting them. Methods: In this cross-sectional study, Quota sampling method was used. To evaluate the health care serv...

1991
Mark L. Palmer Mark Palmer

This paper describes Fido, a predictive cache [palmer 1990] that anticipates access by em­ ploying an associative memory to recognize regularities in access pattern for each isolated access context over time. Continual training adapts the associative memory contents to data­ base and access pattern changes, allowing on­ line access predictions for prefetcbing. We dis­ cuss two salient component...

2014
Ka Yang Daji Qiao Jinsheng Zhang Wensheng Zhang

In outsourced data services, revealing users’ data access pattern may lead to the exposure of a wide range of sensitive information even if data is encrypted. Oblivious RAM has been a well-studied provable solution to access pattern preservation. However, it is not resilient to attacks towards data integrity from the users or the server. In this paper, we study the problem of protecting access ...

2015
Ka Yang Jinsheng Zhang Wensheng Zhang Daji Qiao

In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...

2007
Peter VARCHOL Dušan LEVICKÝ

In this paper, biometric security system for access control based on hand geometry is presented. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Experiments show that the physical dimensions of a human hand contain information that is capable to verify the identity of an individual. The database create...

2010
G. Shivaprasad N. V. Subbareddy Dinesh Acharya

Sequential pattern mining is the process of applying data mining techniques to a sequential database, to extract frequent subsequences to discover correlation that exists among the ordered list of events. Web Usage mining (WUM) discovers and extracts interesting knowledge/patterns from Web logs is one of the applications of Sequential Pattern Mining. In this paper, we present a survey of the se...

2014
Madhav Goyal Naresh Kumar Garg

Handwritten Devanagari Numeral Recognition using Structural and Statistical Features 1 Madhav Goyal, 2 Naresh Kumar Garg 1 Department of Computer Science & Engg, Guru Ram Dass Institute of Engg. & Technology, Bathinda, Punjab, India 2 Department of Computer Science & Engg, GZSPTU Campus, Bathinda, Punjab, India ____________________________________________________________________________________...

Journal: :EURASIP J. Wireless Comm. and Networking 2008
Konstantinos B. Baltzis

A common assumption in cellular communications is the circular-cell approximation. In this paper, an alternative analysis based on the hexagonal shape of the cells is presented. A geometrical-based stochastic model is proposed to describe the angle of arrival of the interfering signals in the reverse link of a cellular system. Explicit closed form expressions are derived, and simulations perfor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید