Search

Your search keyword '"Data integrity"' showing total 19,292 results

Search Constraints

Start Over You searched for: Descriptor "Data integrity" Remove constraint Descriptor: "Data integrity"
19,292 results on '"Data integrity"'

Search Results

101. Information Retrieval in Face-To-Face and Online Focus Groups. A Systematic Review.

102. Digital image copyright protection method based on blockchain and zero trust mechanism.

103. Blockchain‐based secure multifunctional data aggregation for fog‐IoT environments.

104. Intermediate hepatitis C virus (HCV) endemicity and its genotype distribution in Myanmar: A systematic review and meta-analysis.

105. Lessons learned from the MOMENT study on how to recruit and retain a target population online, across borders, and with automated remote data collection.

106. A Novel Active Learning Framework for Cross-Subject Human Activity Recognition from Surface Electromyography.

107. Standard-Deviation-Based Adaptive Median Filter for Elimination of Batwing Effects in Step Microstructure Measurement Using Digital Holography.

108. FNNet: a secure ensemble-based approach for fake news detection using blockchain.

109. A Wireless Ad Hoc Network Communication Platform and Data Transmission Strategies for Multi-Bus Instruments.

110. Sparse Temporal Data-Driven SSA-CNN-LSTM-Based Fault Prediction of Electromechanical Equipment in Rail Transit Stations.

111. Blockchain-Based Secured LEACH Protocol (BSLEACH).

112. In-person and online mixed method non-randomised studies exploring feasibility and acceptability of HEADS: UP, an adapted Mindfulness-Based Stress Reduction programme for stroke survivors experiencing symptoms of anxiety and depression.

113. Identifying trials run in India that are registered in other clinical trial registries: a cross-sectional study.

114. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.

115. QSKCG: Quantum‐based secure key communication and key generation scheme for outsourced data in cloud.

116. Access control for trusted data sharing.

117. Unlocking play willingness: the dual pathways of curiosity drive and downward social comparison in game advertising.

118. Gaps in the usage and reporting of multiple imputation for incomplete data: findings from a scoping review of observational studies addressing causal questions.

119. lab2clean: a novel algorithm for automated cleaning of retrospective clinical laboratory results data for secondary uses.

120. Identity-based controlled delegated outsourcing data integrity auditing scheme.

121. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures.

122. BLOCKCHAIN: FROM CRYPTOCURRENCY TO USAGE IN DIFFERENT SPHERES.

123. Ecosystem extent is a necessary but not sufficient indicator of the state of global forest biodiversity.

124. 基于区块链和人机交互的工程质量验收系统.

125. CleanUpRNAseq: An R/Bioconductor Package for Detecting and Correcting DNA Contamination in RNA-Seq Data.

126. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.

127. Toward Ensuring Data Quality in Multi-Site Cancer Imaging Repositories.

128. A Predictive Model for Benchmarking the Performance of Algorithms for Fake and Counterfeit News Classification in Global Networks.

129. Hardware-Efficient Configurable Ring-Oscillator-Based Physical Unclonable Function/True Random Number Generator Module for Secure Key Management.

130. Securing internet of medical devices using energy efficient blockchain for healthcare 4.0.

131. IoT-based eHealth using blockchain technology: a survey.

132. Hypoxic indices for obstructive sleep apnoea severity and cardiovascular disease risk prediction: A comparison and application in a community population.

133. Management of impacted fetal head at cesarean birth: A systematic review and meta‐analysis.

134. BLOCKCHAIN-BASED ROUTING PROTOCOLS FOR SECURE DATA TRANSMISSION.

135. Refined composite multiscale slope entropy and its application in rolling bearing fault diagnosis.

136. Task-irrelevant visual distractions and mindful self-regulated learning in a low-stakes computer-based assessment.

137. The Challenges of Implementing Cognitive Computing in Small Construction Projects: A Data-Driven Perspective.

138. Quality Analysis of Observation Data of Conventional Railway Basic Control Network.

139. Data collection strategy of HLA simulation system based on non-dominated genetic algorithm.

140. Enhancing IoT network defense: advanced intrusion detection via ensemble learning techniques.

141. MobileNet based secured compliance through open web application security projects in cloud system.

142. Mathematical model enhancing flash memory reliability through DFT-driven error correction coding.

143. A Secure and Verifiable Blockchain-Based Framework for Personal Data Validation.

144. The Importance of Cybersecurity and Protecting of Digital Assets and Understanding the Role of Cybersecurity Laws in Safeguarding Digital Assets.

145. Epidemiological anomaly detection in Philippine public health surveillance data through Newcomb-Benford analysis.

146. Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

147. Continuous High-Precision Positioning in Smartphones by FGO-Based Fusion of GNSS–PPK and PDR.

148. Blockchain Technology in Financial Accounting: Enhancing Transparency, Security, and ESG Reporting.

149. A blockchain-based auditable deduplication scheme for multi-cloud storage.

150. Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data.

Catalog

Books, media, physical & digital resources