Works matching DE "DATA corruption"
Results: 375
MIMO-OFDM Energy Efficient Cognitive System with Intelligent Anti-jam Capability.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2291, doi. 10.1007/s11277-017-4975-8
- By:
- Publication type:
- Article
An Improved Signal Superposition Modulation for Cooperative Transmission.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1235, doi. 10.1007/s11277-014-1928-3
- By:
- Publication type:
- Article
Performance Analysis of Composite Fading Channel Based on Point Estimate Method.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 953, doi. 10.1007/s11277-014-1897-6
- By:
- Publication type:
- Article
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 883, doi. 10.1007/s11277-013-1328-0
- By:
- Publication type:
- Article
A Robust and Cooperative MAC Protocol for IEEE 802.11a Wireless Networks.
- Published in:
- Wireless Personal Communications, 2012, v. 67, n. 3, p. 689, doi. 10.1007/s11277-011-0405-5
- By:
- Publication type:
- Article
A Channel Adaptive ACK Mechanism in High Rate Wireless Personal Area Networks.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 2, p. 473, doi. 10.1007/s11277-011-0353-0
- By:
- Publication type:
- Article
BER Analysis of OFDM Systems Impaired by Phase Noise in Frequency-Selective Fading Channels.
- Published in:
- Wireless Personal Communications, 2011, v. 59, n. 4, p. 667, doi. 10.1007/s11277-010-9931-9
- By:
- Publication type:
- Article
Configural Analysis in Component Space.
- Published in:
- Journal for Person-Oriented Research, 2022, v. 8, n. 1, p. 1, doi. 10.17505/jpor.2022.24217
- By:
- Publication type:
- Article
Standing in the Age of Data Breaches: A CONSUMER-FRIENDLY FRAMEWORK TO PLEADING FUTURE INJURY AND PROVIDING EQUITABLE RELIEF TO DATA BREACH VICTIMS.
- Published in:
- Brooklyn Law Review, 2023, v. 88, n. 3, p. 923
- By:
- Publication type:
- Article
Predicting Trade Mispricing: A Gaussian Multivariate Anomaly Detection Model.
- Published in:
- Journal of Business & Economics Review (JBER), 2022, v. 7, n. 1, p. 61, doi. 10.35609/jber.2022.7.1(2)
- By:
- Publication type:
- Article
ПОРІВНЯЛЬНИЙ АНАЛІЗ ЕФЕКТИВНОСТІ ОКРЕМИХ АСПЕКТІВ ЕКОНОМІЧНОЇ ТА СОЦІАЛЬНОЇ ПОЛІТИКИ У 2014–2019 РР. ТА 2019–2022 РР.
- Published in:
- Scientific Proceedings of Ostroh Academy National University Series, Economics, 2023, v. 57, n. 29, p. 4, doi. 10.25264/2311-5149-2023-29(57)-4-17
- By:
- Publication type:
- Article
Editors' Remarks.
- Published in:
- 2024
- By:
- Publication type:
- Editorial
Corruption spills over on citizens: The case of self‐reported motivation to cheat on tax.
- Published in:
- Bulletin of Economic Research, 2024, v. 76, n. 3, p. 839, doi. 10.1111/boer.12453
- By:
- Publication type:
- Article
A Predictive Model for Software Cost Estimation Using ARIMA Algorithm.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 656, doi. 10.14569/ijacsa.2024.0150764
- By:
- Publication type:
- Article
Design and Development of a Unified Query Platform as Middleware for NoSQL Data Stores.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 628, doi. 10.14569/ijacsa.2024.0150762
- By:
- Publication type:
- Article
Quantum Cryptology in the Big Data Security Era.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 618, doi. 10.14569/ijacsa.2024.0150761
- By:
- Publication type:
- Article
Compliance Framework for Personal Data Protection Law Standards.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 512, doi. 10.14569/ijacsa.2024.0150751
- By:
- Publication type:
- Article
Deployment of Secure Data Parameters Between Stock Inverters and Interfaces Using Command-Contamination-Stealth Management System.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 503, doi. 10.14569/ijacsa.2024.0150750
- By:
- Publication type:
- Article
A Multi-Reading Habits Fusion Adversarial Network for Multi-Modal Fake News Detection.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 403, doi. 10.14569/ijacsa.2024.0150740
- By:
- Publication type:
- Article
Ensemble IDO Method for Outlier Detection and N<sub>2</sub>O Emission Prediction in Agriculture.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 377, doi. 10.14569/ijacsa.2024.0150737
- By:
- Publication type:
- Article
A Blockchain Framework for Academic Certificates Authentication.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 297, doi. 10.14569/ijacsa.2024.0150729
- By:
- Publication type:
- Article
Towards Secure Internet of Things-Enabled Intelligent Transportation Systems: A Comprehensive Review.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 82, doi. 10.14569/ijacsa.2024.0150708
- By:
- Publication type:
- Article
Enhancing Administrative Source Registers for the Development of a Robust Large Language Model: A Novel Methodological Approach.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 9, doi. 10.14569/ijacsa.2024.0150702
- By:
- Publication type:
- Article
On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 1486, doi. 10.14569/ijacsa.2024.01506148
- By:
- Publication type:
- Article
Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 475, doi. 10.14569/ijacsa.2024.0150649
- By:
- Publication type:
- Article
Designing an Experimental Setup for Data Provenance Tracking using a Public Blockchain: A Case Study using a Water Bottling Plant.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 282, doi. 10.14569/ijacsa.2024.0150630
- By:
- Publication type:
- Article
Computer Image Encryption Technology Based on Chaotic Sequence Algorithm.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 220, doi. 10.14569/ijacsa.2024.0150624
- By:
- Publication type:
- Article
Quantitative evaluation of fault propagation in a commercial cloud system.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 3, p. 1, doi. 10.1177/1550147720903613
- By:
- Publication type:
- Article
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System.
- Published in:
- International Journal of Digital Multimedia Broadcasting, 2018, p. 1, doi. 10.1155/2018/7543875
- By:
- Publication type:
- Article
ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS.
- Published in:
- Scalable Computing: Practice & Experience, 2018, v. 19, n. 4, p. 351, doi. 10.12694/scpe.v19i4.1422
- By:
- Publication type:
- Article
CREATING, EDITING, AND SHARING COMPLEX UBIQUITOUS COMPUTING ENVIRONMENT CONFIGURATIONS WITH COLLABORATIONBUS.
- Published in:
- Scalable Computing: Practice & Experience, 2010, v. 11, n. 3, p. 289
- By:
- Publication type:
- Article
Securing oil port logistics: A blockchain framework for efficient and trustworthy trade documents.
- Published in:
- PLoS ONE, 2024, v. 19, n. 10, p. 1, doi. 10.1371/journal.pone.0309526
- By:
- Publication type:
- Article
Geo-questionnaires in urban planning: recruitment methods, participant engagement, and data quality.
- Published in:
- Cartography & Geographic Information Science, 2017, v. 44, n. 6, p. 551, doi. 10.1080/15230406.2016.1230520
- By:
- Publication type:
- Article
Handling missing data in RCTs; a review of the top medical journals.
- Published in:
- BMC Medical Research Methodology, 2014, v. 14, n. 1, p. 1, doi. 10.1186/1471-2288-14-118
- By:
- Publication type:
- Article
Data hosting infrastructure for primary biodiversity data.
- Published in:
- BMC Bioinformatics, 2011, v. 12, n. Suppl 15, p. 1, doi. 10.1186/1471-2105-12-S15-S5
- By:
- Publication type:
- Article
Parallel multiplicity and error discovery rate (EDR) in microarray experiments.
- Published in:
- BMC Bioinformatics, 2010, v. 11, p. 465, doi. 10.1186/1471-2105-11-465
- By:
- Publication type:
- Article
Baseline Correction for NMR Spectroscopic Metabolomics Data Analysis.
- Published in:
- BMC Bioinformatics, 2008, v. 9, p. 1, doi. 10.1186/1471-2105-9-324
- By:
- Publication type:
- Article
Effects of undetected data quality issues on climatological analyses.
- Published in:
- Climate of the Past, 2018, v. 14, n. 1, p. 1, doi. 10.5194/cp-14-1-2018
- By:
- Publication type:
- Article
Fourth Amendment Seizures of Computer Data.
- Published in:
- Yale Law Journal, 2010, v. 119, n. 4, p. 700
- By:
- Publication type:
- Article
On Palimpsest and Data.
- Published in:
- Serials Librarian, 2008, v. 55, n. 3, p. 376, doi. 10.1080/03615260802087172
- By:
- Publication type:
- Article
Instagram Mobile Application Digital Forensics.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 37, n. 2, p. 169, doi. 10.32604/csse.2021.014472
- By:
- Publication type:
- Article
A general theory for subspace-sparse recovery.
- Published in:
- International Journal of Wavelets, Multiresolution & Information Processing, 2022, v. 20, n. 6, p. 1, doi. 10.1142/S021969132250028X
- By:
- Publication type:
- Article
Benchmarking the Robustness of Semantic Segmentation Models with Respect to Common Corruptions.
- Published in:
- International Journal of Computer Vision, 2021, v. 129, n. 2, p. 462, doi. 10.1007/s11263-020-01383-2
- By:
- Publication type:
- Article
Are extreme value estimation methods useful for network data?
- Published in:
- Extremes, 2020, v. 23, n. 1, p. 171, doi. 10.1007/s10687-019-00359-x
- By:
- Publication type:
- Article
Simultaneous Univariate X_bar Charts to Control Bivariate Processes with Autocorrelated Data.
- Published in:
- Quality & Reliability Engineering International, 2015, v. 31, n. 8, p. 1641, doi. 10.1002/qre.1697
- By:
- Publication type:
- Article
UMGAN: multi-scale graph attention network for grid parameter identification.
- Published in:
- Electrical Engineering, 2025, v. 107, n. 2, p. 1397, doi. 10.1007/s00202-024-02589-0
- By:
- Publication type:
- Article
On the Good and Bad of Natural Resource, Corruption, and Economic Growth Nexus.
- Published in:
- Environmental & Resource Economics, 2022, v. 82, n. 4, p. 889, doi. 10.1007/s10640-022-00694-x
- By:
- Publication type:
- Article
The Influence of Data Loss on Diagnostics of Complex System Dynamics.
- Published in:
- Technical Physics Letters, 2018, v. 44, n. 7, p. 640, doi. 10.1134/S1063785018070246
- By:
- Publication type:
- Article
Exploring anti-corruption capabilities of e-procurement in construction project delivery in Nigeria.
- Published in:
- Construction Economics & Building, 2020, v. 20, n. 1, p. 56, doi. 10.5130/AJCEB.v20i1.6964
- By:
- Publication type:
- Article
LSTM-Based Multi-Task Method for Remaining Useful Life Prediction under Corrupted Sensor Data.
- Published in:
- Machines, 2023, v. 11, n. 3, p. 341, doi. 10.3390/machines11030341
- By:
- Publication type:
- Article